General

  • Target

    JaffaCakes118_56aa4a8475bca2f3fcdfbf1dd0a2ae086e696dd72c997e45970fc01506ee60e3

  • Size

    184KB

  • Sample

    241229-eymyhasmd1

  • MD5

    baa50b80db1b75ccf4be4fb2f19a3e02

  • SHA1

    f84e2b3121799adba2af5d0fb5c494070eb23e83

  • SHA256

    56aa4a8475bca2f3fcdfbf1dd0a2ae086e696dd72c997e45970fc01506ee60e3

  • SHA512

    8f6ab8be32b4f11340dd4d1a723cf217108e6f21442bb2cb06fdac1debda4a8b82d5cad161ff1d531fbfeeea0d4574baf6fff908138e05924939bb1062158aec

  • SSDEEP

    3072:9iLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoplzoxss7:9iLVCIT4WK2z1W+CUHZj4Skq/eao3oC

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_56aa4a8475bca2f3fcdfbf1dd0a2ae086e696dd72c997e45970fc01506ee60e3

    • Size

      184KB

    • MD5

      baa50b80db1b75ccf4be4fb2f19a3e02

    • SHA1

      f84e2b3121799adba2af5d0fb5c494070eb23e83

    • SHA256

      56aa4a8475bca2f3fcdfbf1dd0a2ae086e696dd72c997e45970fc01506ee60e3

    • SHA512

      8f6ab8be32b4f11340dd4d1a723cf217108e6f21442bb2cb06fdac1debda4a8b82d5cad161ff1d531fbfeeea0d4574baf6fff908138e05924939bb1062158aec

    • SSDEEP

      3072:9iLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoplzoxss7:9iLVCIT4WK2z1W+CUHZj4Skq/eao3oC

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks