General

  • Target

    JaffaCakes118_6171354635410c7fa46663b8a35685e0bebdf6454c3c3f54c98c3f2fac4ed47e

  • Size

    184KB

  • Sample

    241229-h7tdeswmh1

  • MD5

    de3bd8178400c8b027fa5a881d64d81f

  • SHA1

    44aecaf7e15264b5db2a4e8fc436a0989f947690

  • SHA256

    6171354635410c7fa46663b8a35685e0bebdf6454c3c3f54c98c3f2fac4ed47e

  • SHA512

    31018ecc9fe7fc6b433de71b4b4bb2d7cf08c2adf1a14823c586a2905391dbee92b3a4c4389b9eb7d21cc2d8e43cb75315583222585ea4d5f66704a2104e0f30

  • SSDEEP

    3072:+iLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eao6lzoxss7:+iLVCIT4WK2z1W+CUHZj4Skq/eaoQoC

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_6171354635410c7fa46663b8a35685e0bebdf6454c3c3f54c98c3f2fac4ed47e

    • Size

      184KB

    • MD5

      de3bd8178400c8b027fa5a881d64d81f

    • SHA1

      44aecaf7e15264b5db2a4e8fc436a0989f947690

    • SHA256

      6171354635410c7fa46663b8a35685e0bebdf6454c3c3f54c98c3f2fac4ed47e

    • SHA512

      31018ecc9fe7fc6b433de71b4b4bb2d7cf08c2adf1a14823c586a2905391dbee92b3a4c4389b9eb7d21cc2d8e43cb75315583222585ea4d5f66704a2104e0f30

    • SSDEEP

      3072:+iLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eao6lzoxss7:+iLVCIT4WK2z1W+CUHZj4Skq/eaoQoC

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks