General

  • Target

    JaffaCakes118_53dc9c638a81da77ed2945c1a0b9d213e9db5b68b3969e20eed3fee1f6de0804

  • Size

    184KB

  • Sample

    241230-1h285sspey

  • MD5

    00fd2f8d32b0d9a3af6b7316f795c0fe

  • SHA1

    856f1d825538e51744e2537107db52745a59ea07

  • SHA256

    53dc9c638a81da77ed2945c1a0b9d213e9db5b68b3969e20eed3fee1f6de0804

  • SHA512

    37323634fc04420db9169c4b561aad9378027fecc3de9cbd38ed9f55a1f7b51d5d7914efbbd94dca4ba03e6c96e812eb3a6e2f1218a9124d8c66b74ebd7f0df2

  • SSDEEP

    3072:U92qSmHOhnWpPI1ybmJIiC00PArIojHTYVBCn+rs3Ss3qLMTerLA:U9NSMOEpQ1Q3ODAr+Vy

Malware Config

Extracted

Family

dridex

Botnet

22203

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_53dc9c638a81da77ed2945c1a0b9d213e9db5b68b3969e20eed3fee1f6de0804

    • Size

      184KB

    • MD5

      00fd2f8d32b0d9a3af6b7316f795c0fe

    • SHA1

      856f1d825538e51744e2537107db52745a59ea07

    • SHA256

      53dc9c638a81da77ed2945c1a0b9d213e9db5b68b3969e20eed3fee1f6de0804

    • SHA512

      37323634fc04420db9169c4b561aad9378027fecc3de9cbd38ed9f55a1f7b51d5d7914efbbd94dca4ba03e6c96e812eb3a6e2f1218a9124d8c66b74ebd7f0df2

    • SSDEEP

      3072:U92qSmHOhnWpPI1ybmJIiC00PArIojHTYVBCn+rs3Ss3qLMTerLA:U9NSMOEpQ1Q3ODAr+Vy

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks