General

  • Target

    JaffaCakes118_1f104363cffb79af75410335672acb321b34d810ef211bb8f47c726c1dee9e3f

  • Size

    184KB

  • Sample

    241229-dhqtsazrdt

  • MD5

    2295a33e3e2b40822c014cbc38ad3a70

  • SHA1

    3f9abb8c2051dfe6c1a892f8a830cddf2cb446e7

  • SHA256

    1f104363cffb79af75410335672acb321b34d810ef211bb8f47c726c1dee9e3f

  • SHA512

    8dde4da1c4cc36f3922e6c1123ed56357a1b3fc84ec78dc2b256ecaf2744048f68c292e6c834668b92adf599ba2d275d27a4c8a4e73d75f3ea3dc548d62d2659

  • SSDEEP

    3072:liLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoZlzoxss7:liLVCIT4WK2z1W+CUHZj4Skq/eaoHoC

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_1f104363cffb79af75410335672acb321b34d810ef211bb8f47c726c1dee9e3f

    • Size

      184KB

    • MD5

      2295a33e3e2b40822c014cbc38ad3a70

    • SHA1

      3f9abb8c2051dfe6c1a892f8a830cddf2cb446e7

    • SHA256

      1f104363cffb79af75410335672acb321b34d810ef211bb8f47c726c1dee9e3f

    • SHA512

      8dde4da1c4cc36f3922e6c1123ed56357a1b3fc84ec78dc2b256ecaf2744048f68c292e6c834668b92adf599ba2d275d27a4c8a4e73d75f3ea3dc548d62d2659

    • SSDEEP

      3072:liLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoZlzoxss7:liLVCIT4WK2z1W+CUHZj4Skq/eaoHoC

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks