General

  • Target

    JaffaCakes118_602fc39081b7b008daeb5e8d788edf4e42e82324b4eb0afc41868c12b0bf1ec7

  • Size

    184KB

  • Sample

    241229-3fe2yazpgn

  • MD5

    e137aef099edb7f017d1f486bdf703d9

  • SHA1

    9d99b9ade4a7c8fc0cc8c86ec801edb30ab2ceef

  • SHA256

    602fc39081b7b008daeb5e8d788edf4e42e82324b4eb0afc41868c12b0bf1ec7

  • SHA512

    924bcf65400a7e682dfec15c622a2b989c53caeb12883e2252c4cd569de72f389d9fec0a9ec2d7448afc8e33810f5eccccf329aeee0e5d85dd508e9ab040dcbb

  • SSDEEP

    3072:HiLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoulzoxss7:HiLVCIT4WK2z1W+CUHZj4Skq/eaosoC

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_602fc39081b7b008daeb5e8d788edf4e42e82324b4eb0afc41868c12b0bf1ec7

    • Size

      184KB

    • MD5

      e137aef099edb7f017d1f486bdf703d9

    • SHA1

      9d99b9ade4a7c8fc0cc8c86ec801edb30ab2ceef

    • SHA256

      602fc39081b7b008daeb5e8d788edf4e42e82324b4eb0afc41868c12b0bf1ec7

    • SHA512

      924bcf65400a7e682dfec15c622a2b989c53caeb12883e2252c4cd569de72f389d9fec0a9ec2d7448afc8e33810f5eccccf329aeee0e5d85dd508e9ab040dcbb

    • SSDEEP

      3072:HiLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoulzoxss7:HiLVCIT4WK2z1W+CUHZj4Skq/eaosoC

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks