General

  • Target

    JaffaCakes118_e7b13e2d57f44ca6a7cc4acf1e61353a5a9454d8c6728247b0d7e37d241d7f26

  • Size

    184KB

  • Sample

    241230-c3yjpavpas

  • MD5

    f44e6b9225288e0c35ed380b42cdb147

  • SHA1

    0812dfbb5c479e174e4dab25bb684554377bab22

  • SHA256

    e7b13e2d57f44ca6a7cc4acf1e61353a5a9454d8c6728247b0d7e37d241d7f26

  • SHA512

    1f534b51f1588d3ad4f98779f95b62753d03a16432cadfc22b572c5f374f9353dde2d74e88b620c6a17adfe6ef9ec67feac708db5c406e4a4cc049fe016707e4

  • SSDEEP

    3072:liLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eao2lzoxss7:liLVCIT4WK2z1W+CUHZj4Skq/eaokoC

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_e7b13e2d57f44ca6a7cc4acf1e61353a5a9454d8c6728247b0d7e37d241d7f26

    • Size

      184KB

    • MD5

      f44e6b9225288e0c35ed380b42cdb147

    • SHA1

      0812dfbb5c479e174e4dab25bb684554377bab22

    • SHA256

      e7b13e2d57f44ca6a7cc4acf1e61353a5a9454d8c6728247b0d7e37d241d7f26

    • SHA512

      1f534b51f1588d3ad4f98779f95b62753d03a16432cadfc22b572c5f374f9353dde2d74e88b620c6a17adfe6ef9ec67feac708db5c406e4a4cc049fe016707e4

    • SSDEEP

      3072:liLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eao2lzoxss7:liLVCIT4WK2z1W+CUHZj4Skq/eaokoC

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks