General

  • Target

    JaffaCakes118_fe915d6d0699bc11c353f0df55b8381f0b3cc9f7390c8e2f05deec1aba916608

  • Size

    184KB

  • Sample

    241230-fjs2msyna1

  • MD5

    f016f21fe2017b8b97b7e0c801a4c42a

  • SHA1

    54705de4c37fea3fcdf6beb515e9ba5774a04ac6

  • SHA256

    fe915d6d0699bc11c353f0df55b8381f0b3cc9f7390c8e2f05deec1aba916608

  • SHA512

    b29b4c8dd48d8c88683c5b924f2e3f0fb666129b8704a453abb54b0b7eee8378eb0a6e823a015baadd9914b9ee035602df76f2bf083be0ebe9cae155f22c3c1d

  • SSDEEP

    3072:FJQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8JUa//2uFrSc:ufYOX+wTScR/Xzku9LVwfuG

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_fe915d6d0699bc11c353f0df55b8381f0b3cc9f7390c8e2f05deec1aba916608

    • Size

      184KB

    • MD5

      f016f21fe2017b8b97b7e0c801a4c42a

    • SHA1

      54705de4c37fea3fcdf6beb515e9ba5774a04ac6

    • SHA256

      fe915d6d0699bc11c353f0df55b8381f0b3cc9f7390c8e2f05deec1aba916608

    • SHA512

      b29b4c8dd48d8c88683c5b924f2e3f0fb666129b8704a453abb54b0b7eee8378eb0a6e823a015baadd9914b9ee035602df76f2bf083be0ebe9cae155f22c3c1d

    • SSDEEP

      3072:FJQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8JUa//2uFrSc:ufYOX+wTScR/Xzku9LVwfuG

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks