General

  • Target

    JaffaCakes118_d70ba10b24b04de50ffc8da03fa31e60b19aea5b1f96523133fe72708885242b

  • Size

    184KB

  • Sample

    241230-1ec5vazlbm

  • MD5

    d3552f59700490496785df139c2da22b

  • SHA1

    340c984d3d41abcd931d002ddd4b2e348886b787

  • SHA256

    d70ba10b24b04de50ffc8da03fa31e60b19aea5b1f96523133fe72708885242b

  • SHA512

    e238456892fc1a6c7734d2f81fc7d74037e066312b50940981a8df09c76848f1536f2446ff7d8230b3fac457be1f5554f564688c56be8510e1c00f6d9c36da30

  • SSDEEP

    3072:YJQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8J7a//2uFrSc:1fYOX+wTScR/Xzku9LVwUuG

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_d70ba10b24b04de50ffc8da03fa31e60b19aea5b1f96523133fe72708885242b

    • Size

      184KB

    • MD5

      d3552f59700490496785df139c2da22b

    • SHA1

      340c984d3d41abcd931d002ddd4b2e348886b787

    • SHA256

      d70ba10b24b04de50ffc8da03fa31e60b19aea5b1f96523133fe72708885242b

    • SHA512

      e238456892fc1a6c7734d2f81fc7d74037e066312b50940981a8df09c76848f1536f2446ff7d8230b3fac457be1f5554f564688c56be8510e1c00f6d9c36da30

    • SSDEEP

      3072:YJQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8J7a//2uFrSc:1fYOX+wTScR/Xzku9LVwUuG

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks