General

  • Target

    JaffaCakes118_9c14bbff97ea02e0f086936d405ffc7b70016b3392d2b749e436f2e1202b15ab

  • Size

    184KB

  • Sample

    241229-en6b4askbt

  • MD5

    1db5e56bb6b02347f08c1b0b99a08762

  • SHA1

    5b445771f34b7e3f6a358bfdd4a677b050819fd1

  • SHA256

    9c14bbff97ea02e0f086936d405ffc7b70016b3392d2b749e436f2e1202b15ab

  • SHA512

    10c891541b2adf31ef4c2257e10b31dc85d8515291c74375ad1d9f1ca2d4df47df6a41e8d51b391588b83d24528439a9fd89484b95d927650fcf2d565cf9c1bb

  • SSDEEP

    3072:1iLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoDlzoxss7:1iLVCIT4WK2z1W+CUHZj4Skq/eaoZoC

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_9c14bbff97ea02e0f086936d405ffc7b70016b3392d2b749e436f2e1202b15ab

    • Size

      184KB

    • MD5

      1db5e56bb6b02347f08c1b0b99a08762

    • SHA1

      5b445771f34b7e3f6a358bfdd4a677b050819fd1

    • SHA256

      9c14bbff97ea02e0f086936d405ffc7b70016b3392d2b749e436f2e1202b15ab

    • SHA512

      10c891541b2adf31ef4c2257e10b31dc85d8515291c74375ad1d9f1ca2d4df47df6a41e8d51b391588b83d24528439a9fd89484b95d927650fcf2d565cf9c1bb

    • SSDEEP

      3072:1iLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoDlzoxss7:1iLVCIT4WK2z1W+CUHZj4Skq/eaoZoC

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks