General

  • Target

    JaffaCakes118_d91d7737ad97cd552f5df24aaffda4aac4ccc48ed21b1f74a15078f356d05747

  • Size

    184KB

  • Sample

    241230-e24qesxrh1

  • MD5

    bbf2d07cd8ebc8290f0cc854f9406462

  • SHA1

    22fefe4ba57adb4ac007c6c059dfa4da90474c89

  • SHA256

    d91d7737ad97cd552f5df24aaffda4aac4ccc48ed21b1f74a15078f356d05747

  • SHA512

    c67e310f9aa74cd2ed73c1e2c0ccb9c8047b7ee8adaa549cef1573b6887b899a4248161df1272bb1c28d8eef2d5a5a5211d9f25d3e4b5d305f541b59cf14ed78

  • SSDEEP

    3072:xJQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8JZa//2uFrSc:SfYOX+wTScR/Xzku9LVwOuG

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_d91d7737ad97cd552f5df24aaffda4aac4ccc48ed21b1f74a15078f356d05747

    • Size

      184KB

    • MD5

      bbf2d07cd8ebc8290f0cc854f9406462

    • SHA1

      22fefe4ba57adb4ac007c6c059dfa4da90474c89

    • SHA256

      d91d7737ad97cd552f5df24aaffda4aac4ccc48ed21b1f74a15078f356d05747

    • SHA512

      c67e310f9aa74cd2ed73c1e2c0ccb9c8047b7ee8adaa549cef1573b6887b899a4248161df1272bb1c28d8eef2d5a5a5211d9f25d3e4b5d305f541b59cf14ed78

    • SSDEEP

      3072:xJQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8JZa//2uFrSc:SfYOX+wTScR/Xzku9LVwOuG

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks