General

  • Target

    JaffaCakes118_25aabd5e0c22d5302fb38ff24c82dfe10ce72347b9a3cf9e2961ef479d9a1b48

  • Size

    184KB

  • Sample

    241230-ezz98axrcy

  • MD5

    058baf58090f9a7c107076b0332341f4

  • SHA1

    819b52a7c4474b723f4c1a7100a7584bb78e2860

  • SHA256

    25aabd5e0c22d5302fb38ff24c82dfe10ce72347b9a3cf9e2961ef479d9a1b48

  • SHA512

    be6b5927b5c28b7c99bd455cfc33af5a9805101772a1e212284086fd5754d8cc4a00150d175d6526f1ad205162e6428f6c32f669280fef261f3738a312ade983

  • SSDEEP

    3072:uJQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8JKa//2uFrSc:XfYOX+wTScR/Xzku9LVwZuG

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_25aabd5e0c22d5302fb38ff24c82dfe10ce72347b9a3cf9e2961ef479d9a1b48

    • Size

      184KB

    • MD5

      058baf58090f9a7c107076b0332341f4

    • SHA1

      819b52a7c4474b723f4c1a7100a7584bb78e2860

    • SHA256

      25aabd5e0c22d5302fb38ff24c82dfe10ce72347b9a3cf9e2961ef479d9a1b48

    • SHA512

      be6b5927b5c28b7c99bd455cfc33af5a9805101772a1e212284086fd5754d8cc4a00150d175d6526f1ad205162e6428f6c32f669280fef261f3738a312ade983

    • SSDEEP

      3072:uJQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8JKa//2uFrSc:XfYOX+wTScR/Xzku9LVwZuG

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks