General

  • Target

    JaffaCakes118_380e0a4a4e53e51ac5c4e4bca6031ddf967ec0d9f662fccf514b476b7c29e150

  • Size

    184KB

  • Sample

    241229-ccry8aymew

  • MD5

    5d0d2859c0b1ae42ca9018ec48c10a3a

  • SHA1

    06de59e0d0d49983b05a9216af1ec8edb6dfa5eb

  • SHA256

    380e0a4a4e53e51ac5c4e4bca6031ddf967ec0d9f662fccf514b476b7c29e150

  • SHA512

    308c1f96df54bf39d8b16402f4e79027b24a02450394c91113313c6ce219df9cbfc46c6b0bc05c736cdc08c4543c748c408148b0db805194211e70e07dca62c1

  • SSDEEP

    3072:fiLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoklzoxss7:fiLVCIT4WK2z1W+CUHZj4Skq/eaoaoC

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_380e0a4a4e53e51ac5c4e4bca6031ddf967ec0d9f662fccf514b476b7c29e150

    • Size

      184KB

    • MD5

      5d0d2859c0b1ae42ca9018ec48c10a3a

    • SHA1

      06de59e0d0d49983b05a9216af1ec8edb6dfa5eb

    • SHA256

      380e0a4a4e53e51ac5c4e4bca6031ddf967ec0d9f662fccf514b476b7c29e150

    • SHA512

      308c1f96df54bf39d8b16402f4e79027b24a02450394c91113313c6ce219df9cbfc46c6b0bc05c736cdc08c4543c748c408148b0db805194211e70e07dca62c1

    • SSDEEP

      3072:fiLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoklzoxss7:fiLVCIT4WK2z1W+CUHZj4Skq/eaoaoC

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks