General

  • Target

    JaffaCakes118_f7e3f5d1acd54baffa113a4eb40fc0a55f069d2c8e9c20ac2c0784305f3e38d9

  • Size

    184KB

  • Sample

    241230-e1rz8sxrhm

  • MD5

    f8b347d518cd74b3c0c27f470c099c4a

  • SHA1

    6bb845a77f0b99114a43549a2ae8b8226927a005

  • SHA256

    f7e3f5d1acd54baffa113a4eb40fc0a55f069d2c8e9c20ac2c0784305f3e38d9

  • SHA512

    88acf6fe6fe42d8390ec96ce661f9666f485bef2ddfe33bc9db97475b9ae17f4294e2761013f2fb2118b9cf83ac75e45fe4024bdbf9d26b3f2c12e5aea56a07d

  • SSDEEP

    3072:oiLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaovlzoxss7:oiLVCIT4WK2z1W+CUHZj4Skq/eaotoC

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_f7e3f5d1acd54baffa113a4eb40fc0a55f069d2c8e9c20ac2c0784305f3e38d9

    • Size

      184KB

    • MD5

      f8b347d518cd74b3c0c27f470c099c4a

    • SHA1

      6bb845a77f0b99114a43549a2ae8b8226927a005

    • SHA256

      f7e3f5d1acd54baffa113a4eb40fc0a55f069d2c8e9c20ac2c0784305f3e38d9

    • SHA512

      88acf6fe6fe42d8390ec96ce661f9666f485bef2ddfe33bc9db97475b9ae17f4294e2761013f2fb2118b9cf83ac75e45fe4024bdbf9d26b3f2c12e5aea56a07d

    • SSDEEP

      3072:oiLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaovlzoxss7:oiLVCIT4WK2z1W+CUHZj4Skq/eaotoC

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks