General

  • Target

    JaffaCakes118_4b2b1e0c134060fd7a1d40a462d5d4e2dabd83ccb7a3593d4a71c9560e5c574d

  • Size

    184KB

  • Sample

    241230-1c7xfasmex

  • MD5

    194bb0820efeb21eb8b2b59f35641b5e

  • SHA1

    7257bc35d03bd1d03e1d21c22ed496c167e94b29

  • SHA256

    4b2b1e0c134060fd7a1d40a462d5d4e2dabd83ccb7a3593d4a71c9560e5c574d

  • SHA512

    f04ece84771efa77029198ea9b7f89bcf121a3388192a0084fd2ef5c96dd41b8a301ba31c2a7282810a011802c5e8f7b8a98b6c3d6394073912bf63e859b1038

  • SSDEEP

    3072:+JQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8Jda//2uFrSc:HfYOX+wTScR/Xzku9LVweuG

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_4b2b1e0c134060fd7a1d40a462d5d4e2dabd83ccb7a3593d4a71c9560e5c574d

    • Size

      184KB

    • MD5

      194bb0820efeb21eb8b2b59f35641b5e

    • SHA1

      7257bc35d03bd1d03e1d21c22ed496c167e94b29

    • SHA256

      4b2b1e0c134060fd7a1d40a462d5d4e2dabd83ccb7a3593d4a71c9560e5c574d

    • SHA512

      f04ece84771efa77029198ea9b7f89bcf121a3388192a0084fd2ef5c96dd41b8a301ba31c2a7282810a011802c5e8f7b8a98b6c3d6394073912bf63e859b1038

    • SSDEEP

      3072:+JQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8Jda//2uFrSc:HfYOX+wTScR/Xzku9LVweuG

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks