General

  • Target

    JaffaCakes118_659a11c9471265e73b2d029f0699768e9695f9f072f3a87b0397f494a2066c35

  • Size

    184KB

  • Sample

    241230-13d22stnhs

  • MD5

    70ffdd6e8995ea1505b9940f2dd57931

  • SHA1

    d1192ec679b2dcc1c72b7bdcceddad3e761f67c8

  • SHA256

    659a11c9471265e73b2d029f0699768e9695f9f072f3a87b0397f494a2066c35

  • SHA512

    668f79350391a46683dc8d4dbcd5c6a568dec0e5e712a75dac459f349e1a8d28cd0c25fdc309a44b6b25f525999ca07a3f2caa76233a8708d074aa58d3b2de9b

  • SSDEEP

    3072:ViLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoVlzoxss7:ViLVCIT4WK2z1W+CUHZj4Skq/eao7oC

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_659a11c9471265e73b2d029f0699768e9695f9f072f3a87b0397f494a2066c35

    • Size

      184KB

    • MD5

      70ffdd6e8995ea1505b9940f2dd57931

    • SHA1

      d1192ec679b2dcc1c72b7bdcceddad3e761f67c8

    • SHA256

      659a11c9471265e73b2d029f0699768e9695f9f072f3a87b0397f494a2066c35

    • SHA512

      668f79350391a46683dc8d4dbcd5c6a568dec0e5e712a75dac459f349e1a8d28cd0c25fdc309a44b6b25f525999ca07a3f2caa76233a8708d074aa58d3b2de9b

    • SSDEEP

      3072:ViLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoVlzoxss7:ViLVCIT4WK2z1W+CUHZj4Skq/eao7oC

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks