General

  • Target

    JaffaCakes118_69165e8b7b2dc9e9c5bb3f96f917869bc7ca740fe04ea3adb2cea85a54192d6b

  • Size

    184KB

  • Sample

    241230-e1bcgsxrdy

  • MD5

    a77e5ba6e136f97ad2679536555389a5

  • SHA1

    0eedc7a92f6ae05417587cf756e8724c231af56d

  • SHA256

    69165e8b7b2dc9e9c5bb3f96f917869bc7ca740fe04ea3adb2cea85a54192d6b

  • SHA512

    112f2ed51a3b1c54b70df320c9729e104e1499fae3e044b2a9989c8ef998f5ca60c01363513b7e0d2e09a4b7dd8a9a4c7cfd8a84d8b3ae33b9512db6e38935f0

  • SSDEEP

    3072:4JQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8Jaa//2uFrSc:VfYOX+wTScR/Xzku9LVwVuG

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_69165e8b7b2dc9e9c5bb3f96f917869bc7ca740fe04ea3adb2cea85a54192d6b

    • Size

      184KB

    • MD5

      a77e5ba6e136f97ad2679536555389a5

    • SHA1

      0eedc7a92f6ae05417587cf756e8724c231af56d

    • SHA256

      69165e8b7b2dc9e9c5bb3f96f917869bc7ca740fe04ea3adb2cea85a54192d6b

    • SHA512

      112f2ed51a3b1c54b70df320c9729e104e1499fae3e044b2a9989c8ef998f5ca60c01363513b7e0d2e09a4b7dd8a9a4c7cfd8a84d8b3ae33b9512db6e38935f0

    • SSDEEP

      3072:4JQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8Jaa//2uFrSc:VfYOX+wTScR/Xzku9LVwVuG

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks