General

  • Target

    JaffaCakes118_e4c91b3bd10039d236303979bf8140e5b44f8873ca208e42d02370f24d92a7cd

  • Size

    184KB

  • Sample

    241229-cwspvszkas

  • MD5

    4ebc83ca9e9adf9baa887f647c1d8acd

  • SHA1

    8a83bcb3be4b7925c008696fc48bc9d589e40809

  • SHA256

    e4c91b3bd10039d236303979bf8140e5b44f8873ca208e42d02370f24d92a7cd

  • SHA512

    783e0a230ced4e41bf39e1fed37dcd24283055cf7bda22bc21e9c123edbf05d2eacaf67dabdb58849dbdd72651afa0a4e223abe3cc5698f8e74a0ad127d4e8e3

  • SSDEEP

    3072:liLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoJlzoxss7:liLVCIT4WK2z1W+CUHZj4Skq/eaoXoC

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_e4c91b3bd10039d236303979bf8140e5b44f8873ca208e42d02370f24d92a7cd

    • Size

      184KB

    • MD5

      4ebc83ca9e9adf9baa887f647c1d8acd

    • SHA1

      8a83bcb3be4b7925c008696fc48bc9d589e40809

    • SHA256

      e4c91b3bd10039d236303979bf8140e5b44f8873ca208e42d02370f24d92a7cd

    • SHA512

      783e0a230ced4e41bf39e1fed37dcd24283055cf7bda22bc21e9c123edbf05d2eacaf67dabdb58849dbdd72651afa0a4e223abe3cc5698f8e74a0ad127d4e8e3

    • SSDEEP

      3072:liLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoJlzoxss7:liLVCIT4WK2z1W+CUHZj4Skq/eaoXoC

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks