General

  • Target

    JaffaCakes118_133db1654a4a1457289eff18fe74d0d9ef9b23e04b2ac3f9cfcf924765170502

  • Size

    184KB

  • Sample

    241230-2q3ejsvpav

  • MD5

    08e4099259a226c47c1d53c54232aff7

  • SHA1

    ce454d1efb7a2df0f934d4bca9ad494758e54cf1

  • SHA256

    133db1654a4a1457289eff18fe74d0d9ef9b23e04b2ac3f9cfcf924765170502

  • SHA512

    0c7d48bcd8255a78ad2e7c413baf383662ccde716105542ad62b96242b256f3a0c6dfdc2fb2fa52e1bca4efc3cdfaf71751f85aa9e59a6d567c8ef927bb8b3e4

  • SSDEEP

    3072:lJQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8J/a//2uFrSc:OfYOX+wTScR/Xzku9LVwAuG

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_133db1654a4a1457289eff18fe74d0d9ef9b23e04b2ac3f9cfcf924765170502

    • Size

      184KB

    • MD5

      08e4099259a226c47c1d53c54232aff7

    • SHA1

      ce454d1efb7a2df0f934d4bca9ad494758e54cf1

    • SHA256

      133db1654a4a1457289eff18fe74d0d9ef9b23e04b2ac3f9cfcf924765170502

    • SHA512

      0c7d48bcd8255a78ad2e7c413baf383662ccde716105542ad62b96242b256f3a0c6dfdc2fb2fa52e1bca4efc3cdfaf71751f85aa9e59a6d567c8ef927bb8b3e4

    • SSDEEP

      3072:lJQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8J/a//2uFrSc:OfYOX+wTScR/Xzku9LVwAuG

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks