General

  • Target

    JaffaCakes118_798e0cf45c455d2cae57c228103edf231cf17619d9e0b16ec5cae4192d4195f9

  • Size

    184KB

  • Sample

    241229-nl1s9szqhq

  • MD5

    64f5c5b030f159b68573f41913a3c6db

  • SHA1

    48a4b1f80da5be55cb0118af95091f185ce4d12c

  • SHA256

    798e0cf45c455d2cae57c228103edf231cf17619d9e0b16ec5cae4192d4195f9

  • SHA512

    15699101c7cf509f7057655d00d7e359665d03e0ea358eef69dbd31370bdf1485fefb87b581e36ba88468537cd152279df6cfd520ed2c1c61912f707dd1635a2

  • SSDEEP

    3072:CiLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoZlzoxss7:CiLVCIT4WK2z1W+CUHZj4Skq/eaoHoC

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_798e0cf45c455d2cae57c228103edf231cf17619d9e0b16ec5cae4192d4195f9

    • Size

      184KB

    • MD5

      64f5c5b030f159b68573f41913a3c6db

    • SHA1

      48a4b1f80da5be55cb0118af95091f185ce4d12c

    • SHA256

      798e0cf45c455d2cae57c228103edf231cf17619d9e0b16ec5cae4192d4195f9

    • SHA512

      15699101c7cf509f7057655d00d7e359665d03e0ea358eef69dbd31370bdf1485fefb87b581e36ba88468537cd152279df6cfd520ed2c1c61912f707dd1635a2

    • SSDEEP

      3072:CiLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoZlzoxss7:CiLVCIT4WK2z1W+CUHZj4Skq/eaoHoC

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks