General

  • Target

    JaffaCakes118_029481b29d49c9d1d24d41b2ad76f74148c5a5f9684f122eb8f90949b0c274ab

  • Size

    184KB

  • Sample

    241229-heq3lavrfp

  • MD5

    ef2f31afe32619151f067cd42b4b8865

  • SHA1

    b5838f242fe3f756e50af689492c1d9f85788b58

  • SHA256

    029481b29d49c9d1d24d41b2ad76f74148c5a5f9684f122eb8f90949b0c274ab

  • SHA512

    b715c576ae7db9926b0a0e94e86f0ac8d2b4ee0bffde16cc63f2d4c72b550a921fc0eedd04663ee2eda1ea9193761a4140e3d12f97effe339fee4baf568f8131

  • SSDEEP

    3072:YiLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eao8lzoxss7:YiLVCIT4WK2z1W+CUHZj4Skq/eaoCoC

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_029481b29d49c9d1d24d41b2ad76f74148c5a5f9684f122eb8f90949b0c274ab

    • Size

      184KB

    • MD5

      ef2f31afe32619151f067cd42b4b8865

    • SHA1

      b5838f242fe3f756e50af689492c1d9f85788b58

    • SHA256

      029481b29d49c9d1d24d41b2ad76f74148c5a5f9684f122eb8f90949b0c274ab

    • SHA512

      b715c576ae7db9926b0a0e94e86f0ac8d2b4ee0bffde16cc63f2d4c72b550a921fc0eedd04663ee2eda1ea9193761a4140e3d12f97effe339fee4baf568f8131

    • SSDEEP

      3072:YiLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eao8lzoxss7:YiLVCIT4WK2z1W+CUHZj4Skq/eaoCoC

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks