General

  • Target

    JaffaCakes118_a9d310bada6fcf74edf9b9f64821c9e9f6af3c1dec5dc2f7206d39a6ef8b7189

  • Size

    184KB

  • Sample

    241229-p8yg4aska1

  • MD5

    43552527b43b1ca15d7b71a4fd43edcc

  • SHA1

    3b94bd898d7921760a004139dc091e4a5fb5aafd

  • SHA256

    a9d310bada6fcf74edf9b9f64821c9e9f6af3c1dec5dc2f7206d39a6ef8b7189

  • SHA512

    cbfdea06ecb0dbb07f7ec7d815965c2559680f92f3f42986259dffc0645542d782bde851eca192266bb78138e7007fa8b0b33a424e2d54dc34dbbb358b5ddc20

  • SSDEEP

    3072:fiLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoPlzoxss7:fiLVCIT4WK2z1W+CUHZj4Skq/eaoNoC

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_a9d310bada6fcf74edf9b9f64821c9e9f6af3c1dec5dc2f7206d39a6ef8b7189

    • Size

      184KB

    • MD5

      43552527b43b1ca15d7b71a4fd43edcc

    • SHA1

      3b94bd898d7921760a004139dc091e4a5fb5aafd

    • SHA256

      a9d310bada6fcf74edf9b9f64821c9e9f6af3c1dec5dc2f7206d39a6ef8b7189

    • SHA512

      cbfdea06ecb0dbb07f7ec7d815965c2559680f92f3f42986259dffc0645542d782bde851eca192266bb78138e7007fa8b0b33a424e2d54dc34dbbb358b5ddc20

    • SSDEEP

      3072:fiLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoPlzoxss7:fiLVCIT4WK2z1W+CUHZj4Skq/eaoNoC

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks