General

  • Target

    JaffaCakes118_e6e2c6de5729b8d822248ec469fb02f9a97c61e8d6db844cea0b81759d9496e9

  • Size

    184KB

  • Sample

    241230-e5a8aayjet

  • MD5

    1765d0ca36c9a15b8c57187a4a079a45

  • SHA1

    ebf7bacc3494df3462f66b58c5b370ce8c159ccf

  • SHA256

    e6e2c6de5729b8d822248ec469fb02f9a97c61e8d6db844cea0b81759d9496e9

  • SHA512

    6a0ff7cefe19a75570164ada5e05a6cdfca6995433d709adb86b17123a89f6601ad8548cbd16db45efcfb48a9fc1bbca3a9dda35d0cc5e76835dc6d3041dab36

  • SSDEEP

    3072:liLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoFlzoxss7:liLVCIT4WK2z1W+CUHZj4Skq/eaoLoC

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_e6e2c6de5729b8d822248ec469fb02f9a97c61e8d6db844cea0b81759d9496e9

    • Size

      184KB

    • MD5

      1765d0ca36c9a15b8c57187a4a079a45

    • SHA1

      ebf7bacc3494df3462f66b58c5b370ce8c159ccf

    • SHA256

      e6e2c6de5729b8d822248ec469fb02f9a97c61e8d6db844cea0b81759d9496e9

    • SHA512

      6a0ff7cefe19a75570164ada5e05a6cdfca6995433d709adb86b17123a89f6601ad8548cbd16db45efcfb48a9fc1bbca3a9dda35d0cc5e76835dc6d3041dab36

    • SSDEEP

      3072:liLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoFlzoxss7:liLVCIT4WK2z1W+CUHZj4Skq/eaoLoC

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks