General

  • Target

    JaffaCakes118_cdd96b37a1a139ae8222e068611e8b655147ec4d9008fa9b05654995591cc6c2

  • Size

    184KB

  • Sample

    241230-fnc6zsynhv

  • MD5

    3f66bdb38afb0edb1d5ee4c3f804717a

  • SHA1

    83e843b85aefcdb53888949261cec202c82d6e3c

  • SHA256

    cdd96b37a1a139ae8222e068611e8b655147ec4d9008fa9b05654995591cc6c2

  • SHA512

    6271af842793308a626d913e45b8a0fbf12336e8af3ad082a419a1d92fb941b3ee9916f1b67b5d3882bd952d0fbf657aa90b5baa5e982f772cbb2f7465be7483

  • SSDEEP

    3072:y92qSmHOhnWpPI1ybmJIiC00PArIojHTYVBCn+rs3Ss3qLMThrLA:y9NSMOEpQ1Q3ODAr+VB

Malware Config

Extracted

Family

dridex

Botnet

22203

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_cdd96b37a1a139ae8222e068611e8b655147ec4d9008fa9b05654995591cc6c2

    • Size

      184KB

    • MD5

      3f66bdb38afb0edb1d5ee4c3f804717a

    • SHA1

      83e843b85aefcdb53888949261cec202c82d6e3c

    • SHA256

      cdd96b37a1a139ae8222e068611e8b655147ec4d9008fa9b05654995591cc6c2

    • SHA512

      6271af842793308a626d913e45b8a0fbf12336e8af3ad082a419a1d92fb941b3ee9916f1b67b5d3882bd952d0fbf657aa90b5baa5e982f772cbb2f7465be7483

    • SSDEEP

      3072:y92qSmHOhnWpPI1ybmJIiC00PArIojHTYVBCn+rs3Ss3qLMThrLA:y9NSMOEpQ1Q3ODAr+VB

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks