General

  • Target

    JaffaCakes118_08ac183525a297109b20a6b7e3a7761208bf0abc394507581816f6c1ab0a00ab

  • Size

    184KB

  • Sample

    241230-28pw6stkbq

  • MD5

    e46e358fc3ccea7ba06a6eefcd78e614

  • SHA1

    d50136c9bea21dfc3812996bed5469034d9b59ea

  • SHA256

    08ac183525a297109b20a6b7e3a7761208bf0abc394507581816f6c1ab0a00ab

  • SHA512

    545718c0c31f2a84852abacb617b250c2889964b243d076d9323948bf55784c2f0ffe5f4db439da67e20b6d039defd7dae31a718ac2b16ff62438fcbc4eb18d7

  • SSDEEP

    3072:tJQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8JJa//2uFrSc:WfYOX+wTScR/Xzku9LVweuG

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_08ac183525a297109b20a6b7e3a7761208bf0abc394507581816f6c1ab0a00ab

    • Size

      184KB

    • MD5

      e46e358fc3ccea7ba06a6eefcd78e614

    • SHA1

      d50136c9bea21dfc3812996bed5469034d9b59ea

    • SHA256

      08ac183525a297109b20a6b7e3a7761208bf0abc394507581816f6c1ab0a00ab

    • SHA512

      545718c0c31f2a84852abacb617b250c2889964b243d076d9323948bf55784c2f0ffe5f4db439da67e20b6d039defd7dae31a718ac2b16ff62438fcbc4eb18d7

    • SSDEEP

      3072:tJQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8JJa//2uFrSc:WfYOX+wTScR/Xzku9LVweuG

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks