General

  • Target

    JaffaCakes118_4dcd14073aacb2bde3f156f56cc1d5379d042ce1247f598dadcd8a9b9b3ad63f

  • Size

    184KB

  • Sample

    241229-cwt8pazkat

  • MD5

    4d73309321c6ded950cd3c3f140e742d

  • SHA1

    948d19b58993833fa5dfc09ff620d77e25da82a1

  • SHA256

    4dcd14073aacb2bde3f156f56cc1d5379d042ce1247f598dadcd8a9b9b3ad63f

  • SHA512

    a19074d6a73390033ef2334ffdfa7e03fc2cc444e6f130b397139c31836e8f8dee63fc07f844599e55c49632693a71ac636f5d6821fe3bbea538459582d8ac4e

  • SSDEEP

    3072:5iLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaodlzoxss7:5iLVCIT4WK2z1W+CUHZj4Skq/eaozoC

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_4dcd14073aacb2bde3f156f56cc1d5379d042ce1247f598dadcd8a9b9b3ad63f

    • Size

      184KB

    • MD5

      4d73309321c6ded950cd3c3f140e742d

    • SHA1

      948d19b58993833fa5dfc09ff620d77e25da82a1

    • SHA256

      4dcd14073aacb2bde3f156f56cc1d5379d042ce1247f598dadcd8a9b9b3ad63f

    • SHA512

      a19074d6a73390033ef2334ffdfa7e03fc2cc444e6f130b397139c31836e8f8dee63fc07f844599e55c49632693a71ac636f5d6821fe3bbea538459582d8ac4e

    • SSDEEP

      3072:5iLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaodlzoxss7:5iLVCIT4WK2z1W+CUHZj4Skq/eaozoC

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks