General

  • Target

    JaffaCakes118_df989eaee1f9fcb916cc77c50591e3e36d06327e71afa52ab0076c14155ed1a3

  • Size

    184KB

  • Sample

    241229-lqbc3ayma1

  • MD5

    bbf30ea009f7abfdf53dc8ec158b734d

  • SHA1

    f1dd031bdaaf9260a5d3dd9f22911977e55850b9

  • SHA256

    df989eaee1f9fcb916cc77c50591e3e36d06327e71afa52ab0076c14155ed1a3

  • SHA512

    34e8cb0a98568ab3c90c2578900b7731ca60a84f121df3707beea30895a9dc55fc9d6d60144d260c6f5110c21d408a84878b3f0b0405032375f750580bea91a5

  • SSDEEP

    3072:AiLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoTlzoxss7:AiLVCIT4WK2z1W+CUHZj4Skq/eaoJoC

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_df989eaee1f9fcb916cc77c50591e3e36d06327e71afa52ab0076c14155ed1a3

    • Size

      184KB

    • MD5

      bbf30ea009f7abfdf53dc8ec158b734d

    • SHA1

      f1dd031bdaaf9260a5d3dd9f22911977e55850b9

    • SHA256

      df989eaee1f9fcb916cc77c50591e3e36d06327e71afa52ab0076c14155ed1a3

    • SHA512

      34e8cb0a98568ab3c90c2578900b7731ca60a84f121df3707beea30895a9dc55fc9d6d60144d260c6f5110c21d408a84878b3f0b0405032375f750580bea91a5

    • SSDEEP

      3072:AiLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoTlzoxss7:AiLVCIT4WK2z1W+CUHZj4Skq/eaoJoC

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks