General

  • Target

    JaffaCakes118_27b9d845315252d20cfdf852f7fa6df57a22b1c8f028f43df458b01385e8458d

  • Size

    184KB

  • Sample

    241228-2dx93atpbj

  • MD5

    6d372d7c98546c773d5cae1951b22b96

  • SHA1

    5bfd0da878aac373c983fd5652e7f539e73ce271

  • SHA256

    27b9d845315252d20cfdf852f7fa6df57a22b1c8f028f43df458b01385e8458d

  • SHA512

    7494f66c2bf9327342750608d59fcb256ac785a58d14a67c2dbbf42b915e061a4ca58a1c212897e44b4476ecdb0d8c8ba319a927c3c114a1affedd1f843c25f8

  • SSDEEP

    3072:eiLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaorlzoxss7:eiLVCIT4WK2z1W+CUHZj4Skq/eaoRoC

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_27b9d845315252d20cfdf852f7fa6df57a22b1c8f028f43df458b01385e8458d

    • Size

      184KB

    • MD5

      6d372d7c98546c773d5cae1951b22b96

    • SHA1

      5bfd0da878aac373c983fd5652e7f539e73ce271

    • SHA256

      27b9d845315252d20cfdf852f7fa6df57a22b1c8f028f43df458b01385e8458d

    • SHA512

      7494f66c2bf9327342750608d59fcb256ac785a58d14a67c2dbbf42b915e061a4ca58a1c212897e44b4476ecdb0d8c8ba319a927c3c114a1affedd1f843c25f8

    • SSDEEP

      3072:eiLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaorlzoxss7:eiLVCIT4WK2z1W+CUHZj4Skq/eaoRoC

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks