General

  • Target

    JaffaCakes118_35765a37a6b34dda3627c3597cdaaf0acf9220de100440d42e2064c3cc93bd44

  • Size

    184KB

  • Sample

    241230-3geskawqdy

  • MD5

    de32dc9a6db35e9d9a559f3c5b22fe04

  • SHA1

    1c00ae77f404def0a95e9c84ecd9f64c9790dd53

  • SHA256

    35765a37a6b34dda3627c3597cdaaf0acf9220de100440d42e2064c3cc93bd44

  • SHA512

    331dd71a59dc7c34d6f7514e983b77beb17387fa3376a4bbea89a6787d2dcb30c24cc0dbe1ba8817179143ec84b564bb4eb105b89edc8a2ce551a2667ddec192

  • SSDEEP

    3072:6JQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8Jea//2uFrSc:bfYOX+wTScR/Xzku9LVwFuG

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_35765a37a6b34dda3627c3597cdaaf0acf9220de100440d42e2064c3cc93bd44

    • Size

      184KB

    • MD5

      de32dc9a6db35e9d9a559f3c5b22fe04

    • SHA1

      1c00ae77f404def0a95e9c84ecd9f64c9790dd53

    • SHA256

      35765a37a6b34dda3627c3597cdaaf0acf9220de100440d42e2064c3cc93bd44

    • SHA512

      331dd71a59dc7c34d6f7514e983b77beb17387fa3376a4bbea89a6787d2dcb30c24cc0dbe1ba8817179143ec84b564bb4eb105b89edc8a2ce551a2667ddec192

    • SSDEEP

      3072:6JQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8Jea//2uFrSc:bfYOX+wTScR/Xzku9LVwFuG

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks