General

  • Target

    JaffaCakes118_8527ff6b17aa7d7d1b433147c5e1034e8a68a3e0125d879c067ed4822cdc06f0

  • Size

    184KB

  • Sample

    241229-1769dsymbl

  • MD5

    b0aa1ef8926f83feda5df962988876f3

  • SHA1

    9527b6fd2fb928cc3f0d878848d3cc90ae541f48

  • SHA256

    8527ff6b17aa7d7d1b433147c5e1034e8a68a3e0125d879c067ed4822cdc06f0

  • SHA512

    a91e88b6395efa0436e3dc3cd640cd4a9c8136701e313d30528017cad8aba26c216a78bea140981d45f566ec19cc79e10bf8cf01d9cc367202fcfa7b352e353a

  • SSDEEP

    3072:liLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eao5lzoxss7:liLVCIT4WK2z1W+CUHZj4Skq/eaonoC

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_8527ff6b17aa7d7d1b433147c5e1034e8a68a3e0125d879c067ed4822cdc06f0

    • Size

      184KB

    • MD5

      b0aa1ef8926f83feda5df962988876f3

    • SHA1

      9527b6fd2fb928cc3f0d878848d3cc90ae541f48

    • SHA256

      8527ff6b17aa7d7d1b433147c5e1034e8a68a3e0125d879c067ed4822cdc06f0

    • SHA512

      a91e88b6395efa0436e3dc3cd640cd4a9c8136701e313d30528017cad8aba26c216a78bea140981d45f566ec19cc79e10bf8cf01d9cc367202fcfa7b352e353a

    • SSDEEP

      3072:liLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eao5lzoxss7:liLVCIT4WK2z1W+CUHZj4Skq/eaonoC

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks