General

  • Target

    JaffaCakes118_2357f70029a15fa603cfda0783b46c63dbb7d6eade74e5c16d9ad7c832cbf86d

  • Size

    184KB

  • Sample

    241230-gecpjazmgw

  • MD5

    619e6171d6461b052a4c7d4d25af9d41

  • SHA1

    ceb4e422f32892e7a39eccd1524a18be9832c62d

  • SHA256

    2357f70029a15fa603cfda0783b46c63dbb7d6eade74e5c16d9ad7c832cbf86d

  • SHA512

    66c3f4575183254955f51c6563fc0b8590232149586d700ad489727fc2e94bba20b6e8b07712caff348ac07b222c439b34e7fa6a8bdc23fa6ed0ff1f6fdd36a3

  • SSDEEP

    3072:NJQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8Jea//2uFrSc:2fYOX+wTScR/Xzku9LVwZuG

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_2357f70029a15fa603cfda0783b46c63dbb7d6eade74e5c16d9ad7c832cbf86d

    • Size

      184KB

    • MD5

      619e6171d6461b052a4c7d4d25af9d41

    • SHA1

      ceb4e422f32892e7a39eccd1524a18be9832c62d

    • SHA256

      2357f70029a15fa603cfda0783b46c63dbb7d6eade74e5c16d9ad7c832cbf86d

    • SHA512

      66c3f4575183254955f51c6563fc0b8590232149586d700ad489727fc2e94bba20b6e8b07712caff348ac07b222c439b34e7fa6a8bdc23fa6ed0ff1f6fdd36a3

    • SSDEEP

      3072:NJQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8Jea//2uFrSc:2fYOX+wTScR/Xzku9LVwZuG

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks