General

  • Target

    JaffaCakes118_6b1694b4f5c8194272a0bdf9f15f0aa1723500a8b6f8343c0d1d8e1982c0c7b5

  • Size

    184KB

  • Sample

    241230-cgdmdstqcy

  • MD5

    9f54ef9f816cb6df82f6a18fc745a347

  • SHA1

    c496fe66b05ae8910b0c6451800e2c87f109dc46

  • SHA256

    6b1694b4f5c8194272a0bdf9f15f0aa1723500a8b6f8343c0d1d8e1982c0c7b5

  • SHA512

    e43eec7d6848ca65bc5a707e85f34a016e1c69affb77c941ec6f2757486c1025cf0eb63cf9159a2c3a3b751eb01be36c0d5f802816a03443dbffcacbc3c69901

  • SSDEEP

    3072:/iLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoQlzoxss7:/iLVCIT4WK2z1W+CUHZj4Skq/eaouoC

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_6b1694b4f5c8194272a0bdf9f15f0aa1723500a8b6f8343c0d1d8e1982c0c7b5

    • Size

      184KB

    • MD5

      9f54ef9f816cb6df82f6a18fc745a347

    • SHA1

      c496fe66b05ae8910b0c6451800e2c87f109dc46

    • SHA256

      6b1694b4f5c8194272a0bdf9f15f0aa1723500a8b6f8343c0d1d8e1982c0c7b5

    • SHA512

      e43eec7d6848ca65bc5a707e85f34a016e1c69affb77c941ec6f2757486c1025cf0eb63cf9159a2c3a3b751eb01be36c0d5f802816a03443dbffcacbc3c69901

    • SSDEEP

      3072:/iLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoQlzoxss7:/iLVCIT4WK2z1W+CUHZj4Skq/eaouoC

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks