General

  • Target

    JaffaCakes118_6a12cac9c5f7567e45a9a68895a9f92fc05bc9b33323a38baf64647bbfd0a3f3

  • Size

    184KB

  • Sample

    241229-kgwrzaxncv

  • MD5

    b552f5c7addc5657e217d3bc2f712348

  • SHA1

    27a120d373aaa256b7e957114d5be6be6348325e

  • SHA256

    6a12cac9c5f7567e45a9a68895a9f92fc05bc9b33323a38baf64647bbfd0a3f3

  • SHA512

    0943d0129fa463bad66dd2f9546f51265547eeb2c27a19afc018fa5ad9cd3b3de4ab423fa2dee911b3e168565b9e3dbd7710cf7f9afba22af0b9c7a91d7adb66

  • SSDEEP

    3072:JiLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoclzoxss7:JiLVCIT4WK2z1W+CUHZj4Skq/eaoioC

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_6a12cac9c5f7567e45a9a68895a9f92fc05bc9b33323a38baf64647bbfd0a3f3

    • Size

      184KB

    • MD5

      b552f5c7addc5657e217d3bc2f712348

    • SHA1

      27a120d373aaa256b7e957114d5be6be6348325e

    • SHA256

      6a12cac9c5f7567e45a9a68895a9f92fc05bc9b33323a38baf64647bbfd0a3f3

    • SHA512

      0943d0129fa463bad66dd2f9546f51265547eeb2c27a19afc018fa5ad9cd3b3de4ab423fa2dee911b3e168565b9e3dbd7710cf7f9afba22af0b9c7a91d7adb66

    • SSDEEP

      3072:JiLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoclzoxss7:JiLVCIT4WK2z1W+CUHZj4Skq/eaoioC

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks