General

  • Target

    JaffaCakes118_1d9c57315c432b91a787d0297cf576ed54da9cfbcd94bc5102ead1e70d0ed046

  • Size

    184KB

  • Sample

    241230-ftmbvayqeq

  • MD5

    b55a32dfd5c941b58a6e61decb4db5cc

  • SHA1

    15fe2ef461657d1092797adff66b1abc9775833d

  • SHA256

    1d9c57315c432b91a787d0297cf576ed54da9cfbcd94bc5102ead1e70d0ed046

  • SHA512

    e08372b8f01e7bd72a6de6b19434222909223c7080e9007c7f84499d35040e5fc090adb6f3766cfb8c1aab463f65111e167384cfe8f458a232125fd98f21ffd3

  • SSDEEP

    3072:kJQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8Jpa//2uFrSc:JfYOX+wTScR/Xzku9LVw+uG

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_1d9c57315c432b91a787d0297cf576ed54da9cfbcd94bc5102ead1e70d0ed046

    • Size

      184KB

    • MD5

      b55a32dfd5c941b58a6e61decb4db5cc

    • SHA1

      15fe2ef461657d1092797adff66b1abc9775833d

    • SHA256

      1d9c57315c432b91a787d0297cf576ed54da9cfbcd94bc5102ead1e70d0ed046

    • SHA512

      e08372b8f01e7bd72a6de6b19434222909223c7080e9007c7f84499d35040e5fc090adb6f3766cfb8c1aab463f65111e167384cfe8f458a232125fd98f21ffd3

    • SSDEEP

      3072:kJQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8Jpa//2uFrSc:JfYOX+wTScR/Xzku9LVw+uG

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks