General

  • Target

    JaffaCakes118_e90f07e5b49ffa2536f55507f6d43aa4b1a3e70211608b208f91ce524f0e8a7b

  • Size

    184KB

  • Sample

    241230-fjybcsynep

  • MD5

    e4308aa6981a6bb7af1adce4a6af60e1

  • SHA1

    c74cfe6b31c213d91100602e8dc987c3c3f16b8b

  • SHA256

    e90f07e5b49ffa2536f55507f6d43aa4b1a3e70211608b208f91ce524f0e8a7b

  • SHA512

    44dd266ede40581c24729ff5bf6f7dbb87c0e04dc0952c27a890ab08f6a344e3a4e2cd18b5599d6366c7abc273e631bd16d90f402edbcd4cefadad02b932182c

  • SSDEEP

    3072:CJQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8Jqa//2uFrSc:jfYOX+wTScR/Xzku9LVw5uG

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_e90f07e5b49ffa2536f55507f6d43aa4b1a3e70211608b208f91ce524f0e8a7b

    • Size

      184KB

    • MD5

      e4308aa6981a6bb7af1adce4a6af60e1

    • SHA1

      c74cfe6b31c213d91100602e8dc987c3c3f16b8b

    • SHA256

      e90f07e5b49ffa2536f55507f6d43aa4b1a3e70211608b208f91ce524f0e8a7b

    • SHA512

      44dd266ede40581c24729ff5bf6f7dbb87c0e04dc0952c27a890ab08f6a344e3a4e2cd18b5599d6366c7abc273e631bd16d90f402edbcd4cefadad02b932182c

    • SSDEEP

      3072:CJQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8Jqa//2uFrSc:jfYOX+wTScR/Xzku9LVw5uG

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks