General

  • Target

    JaffaCakes118_49e2630f5e756a36392efd43fbceee8eeae6201362e0c1fbc3aa2871104156a5

  • Size

    184KB

  • Sample

    241229-esvq6asldl

  • MD5

    d2565de08c260ffbe3189abafb21d09c

  • SHA1

    ae7e2b8c96dfdf8f6c5e17baf0c6d0ca62d91d80

  • SHA256

    49e2630f5e756a36392efd43fbceee8eeae6201362e0c1fbc3aa2871104156a5

  • SHA512

    078e950fe7060acec5c3024d89da35af977a5c395bd1f77b9658f70095afae4dc475d784675dcd76960ae217796249c5ef943b28e4d665dfa096a7017e6839e5

  • SSDEEP

    3072:ziLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaozlzoxss7:ziLVCIT4WK2z1W+CUHZj4Skq/eaopoC

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_49e2630f5e756a36392efd43fbceee8eeae6201362e0c1fbc3aa2871104156a5

    • Size

      184KB

    • MD5

      d2565de08c260ffbe3189abafb21d09c

    • SHA1

      ae7e2b8c96dfdf8f6c5e17baf0c6d0ca62d91d80

    • SHA256

      49e2630f5e756a36392efd43fbceee8eeae6201362e0c1fbc3aa2871104156a5

    • SHA512

      078e950fe7060acec5c3024d89da35af977a5c395bd1f77b9658f70095afae4dc475d784675dcd76960ae217796249c5ef943b28e4d665dfa096a7017e6839e5

    • SSDEEP

      3072:ziLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaozlzoxss7:ziLVCIT4WK2z1W+CUHZj4Skq/eaopoC

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks