General

  • Target

    JaffaCakes118_241b541add0aa356b44beaa18d536da3d44be96f7e178f4dbe77bc3aeec66d11

  • Size

    184KB

  • Sample

    241230-c3mgesvphq

  • MD5

    6015e1d00d22e42af2667904d34a6546

  • SHA1

    0f1c6e41a809b690727e0b3109bd0a7ccbc737ab

  • SHA256

    241b541add0aa356b44beaa18d536da3d44be96f7e178f4dbe77bc3aeec66d11

  • SHA512

    03dcdcb0ded3ab0ce4ca10181892aea282845d94d0fce8e328b3e82e6a2c80af6aae7f0e70cc6b2e159f61f27d240bcfdb140fbbd4760ab6ffd02da07011d257

  • SSDEEP

    3072:DiLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eao7lzoxss7:DiLVCIT4WK2z1W+CUHZj4Skq/eaoBoC

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_241b541add0aa356b44beaa18d536da3d44be96f7e178f4dbe77bc3aeec66d11

    • Size

      184KB

    • MD5

      6015e1d00d22e42af2667904d34a6546

    • SHA1

      0f1c6e41a809b690727e0b3109bd0a7ccbc737ab

    • SHA256

      241b541add0aa356b44beaa18d536da3d44be96f7e178f4dbe77bc3aeec66d11

    • SHA512

      03dcdcb0ded3ab0ce4ca10181892aea282845d94d0fce8e328b3e82e6a2c80af6aae7f0e70cc6b2e159f61f27d240bcfdb140fbbd4760ab6ffd02da07011d257

    • SSDEEP

      3072:DiLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eao7lzoxss7:DiLVCIT4WK2z1W+CUHZj4Skq/eaoBoC

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks