General

  • Target

    JaffaCakes118_d2c5b7d3fc6b4e57ebcdada7f6d501508a0591904f86e042d4c113b03fa05508

  • Size

    184KB

  • Sample

    241230-bctblssnbm

  • MD5

    ef8a9e46dae762295e40e0629dd1d86e

  • SHA1

    1f1952515c7d6ff34b3edb65a5dd5d4ef2625c84

  • SHA256

    d2c5b7d3fc6b4e57ebcdada7f6d501508a0591904f86e042d4c113b03fa05508

  • SHA512

    5412dd0b5df5cff2f843f8ed61ab06720ef83b0950e7765b4a7d5b87ada79ce5d3ea066b9abc3fec17c76c07bd0b9d465393c247df6796e17a72ca0ea4d3c7cf

  • SSDEEP

    3072:OiLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eao+lzoxss7:OiLVCIT4WK2z1W+CUHZj4Skq/eaocoC

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_d2c5b7d3fc6b4e57ebcdada7f6d501508a0591904f86e042d4c113b03fa05508

    • Size

      184KB

    • MD5

      ef8a9e46dae762295e40e0629dd1d86e

    • SHA1

      1f1952515c7d6ff34b3edb65a5dd5d4ef2625c84

    • SHA256

      d2c5b7d3fc6b4e57ebcdada7f6d501508a0591904f86e042d4c113b03fa05508

    • SHA512

      5412dd0b5df5cff2f843f8ed61ab06720ef83b0950e7765b4a7d5b87ada79ce5d3ea066b9abc3fec17c76c07bd0b9d465393c247df6796e17a72ca0ea4d3c7cf

    • SSDEEP

      3072:OiLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eao+lzoxss7:OiLVCIT4WK2z1W+CUHZj4Skq/eaocoC

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks