General

  • Target

    JaffaCakes118_ea5a99a63e53fcdfc5786236b8e15df1cfc27eefb3460aff74c43f75ac6beebc

  • Size

    184KB

  • Sample

    241230-2v7vtsvqfv

  • MD5

    25db468f88820abdc3a27f90b7814d90

  • SHA1

    ff1cf7dd7586cd66488fce913139a4019428c25a

  • SHA256

    ea5a99a63e53fcdfc5786236b8e15df1cfc27eefb3460aff74c43f75ac6beebc

  • SHA512

    4e9b264601b50fafdbfad05b1ea070771463578ded5e9a763627c0bf14bbc6de23d9f97062d90e15c96ff949211a094e4c9bf839d7b55dae71b1bd23350eb39e

  • SSDEEP

    3072:092qSmHOhnWpPI1ybmJIiC00PArIojHTYVBCn+rs3Ss3qLMTrrLA:09NSMOEpQ1Q3ODAr+VL

Malware Config

Extracted

Family

dridex

Botnet

22203

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_ea5a99a63e53fcdfc5786236b8e15df1cfc27eefb3460aff74c43f75ac6beebc

    • Size

      184KB

    • MD5

      25db468f88820abdc3a27f90b7814d90

    • SHA1

      ff1cf7dd7586cd66488fce913139a4019428c25a

    • SHA256

      ea5a99a63e53fcdfc5786236b8e15df1cfc27eefb3460aff74c43f75ac6beebc

    • SHA512

      4e9b264601b50fafdbfad05b1ea070771463578ded5e9a763627c0bf14bbc6de23d9f97062d90e15c96ff949211a094e4c9bf839d7b55dae71b1bd23350eb39e

    • SSDEEP

      3072:092qSmHOhnWpPI1ybmJIiC00PArIojHTYVBCn+rs3Ss3qLMTrrLA:09NSMOEpQ1Q3ODAr+VL

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks