General

  • Target

    JaffaCakes118_27a51472bfbcfb7cb04e79b0632f90d99d8439c629c4bdc89c839c11d8ab2020

  • Size

    184KB

  • Sample

    241230-f7sqsazley

  • MD5

    454e4df5f63769ea56351c57ca0f7abc

  • SHA1

    7d29de2a7a3238c823176c8f928814ea96116d27

  • SHA256

    27a51472bfbcfb7cb04e79b0632f90d99d8439c629c4bdc89c839c11d8ab2020

  • SHA512

    0facf3374ecbdf36b20023e3b179e2f65b91800fea4b201e1255bb277fed69db5d9760df0234926a3dc48d1cdf12f3376d4c8ebe550c0acb5795011373b99328

  • SSDEEP

    3072:liLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaollzoxss7:liLVCIT4WK2z1W+CUHZj4Skq/eaoroC

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_27a51472bfbcfb7cb04e79b0632f90d99d8439c629c4bdc89c839c11d8ab2020

    • Size

      184KB

    • MD5

      454e4df5f63769ea56351c57ca0f7abc

    • SHA1

      7d29de2a7a3238c823176c8f928814ea96116d27

    • SHA256

      27a51472bfbcfb7cb04e79b0632f90d99d8439c629c4bdc89c839c11d8ab2020

    • SHA512

      0facf3374ecbdf36b20023e3b179e2f65b91800fea4b201e1255bb277fed69db5d9760df0234926a3dc48d1cdf12f3376d4c8ebe550c0acb5795011373b99328

    • SSDEEP

      3072:liLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaollzoxss7:liLVCIT4WK2z1W+CUHZj4Skq/eaoroC

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks