General

  • Target

    JaffaCakes118_18fef3bbad41f44a832e64f7080fba9dcd01e93b33d28cbd8350d93cee5b8323

  • Size

    184KB

  • Sample

    241230-3f9xbawqdt

  • MD5

    73445d90e2ffe30a9a105045e12e5102

  • SHA1

    c93363201e1be1f10a6cc811647e631e874aa5fd

  • SHA256

    18fef3bbad41f44a832e64f7080fba9dcd01e93b33d28cbd8350d93cee5b8323

  • SHA512

    a0de5c0c4456eaf66cc8f796a396c0697b1bff24957c117fa7400c85a5002b9f3ef3caa3291a3d16c8b432e0050879ee5614c56b376afc777e1f2c4916e7f2eb

  • SSDEEP

    3072:OiLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoIlzoxss7:OiLVCIT4WK2z1W+CUHZj4Skq/eaoWoC

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_18fef3bbad41f44a832e64f7080fba9dcd01e93b33d28cbd8350d93cee5b8323

    • Size

      184KB

    • MD5

      73445d90e2ffe30a9a105045e12e5102

    • SHA1

      c93363201e1be1f10a6cc811647e631e874aa5fd

    • SHA256

      18fef3bbad41f44a832e64f7080fba9dcd01e93b33d28cbd8350d93cee5b8323

    • SHA512

      a0de5c0c4456eaf66cc8f796a396c0697b1bff24957c117fa7400c85a5002b9f3ef3caa3291a3d16c8b432e0050879ee5614c56b376afc777e1f2c4916e7f2eb

    • SSDEEP

      3072:OiLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoIlzoxss7:OiLVCIT4WK2z1W+CUHZj4Skq/eaoWoC

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks