General

  • Target

    JaffaCakes118_02fa1f741e37ea101004782d4b74f44619d37aea6dbfbc443bbd9f04f2791e02

  • Size

    184KB

  • Sample

    241230-gtjrdszqep

  • MD5

    abbe27d0722b7c6807bfde310edcb5ed

  • SHA1

    aa6ffa9fd89b441fe396e1db4c44db6eeb395b70

  • SHA256

    02fa1f741e37ea101004782d4b74f44619d37aea6dbfbc443bbd9f04f2791e02

  • SHA512

    b587cef7f419db00c5e9bc63b6690b23c63811784de6c615a90014ad4aea35d379dca4a7eb311b8222c6a01277a8a305a9182c03f4c9cff6ac5343b4c352164a

  • SSDEEP

    3072:O92qSmHOhnWpPI1ybmJIiC00PArIojHTYVBCn+rs3Ss3qLMTerLA:O9NSMOEpQ1Q3ODAr+Va

Malware Config

Extracted

Family

dridex

Botnet

22203

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_02fa1f741e37ea101004782d4b74f44619d37aea6dbfbc443bbd9f04f2791e02

    • Size

      184KB

    • MD5

      abbe27d0722b7c6807bfde310edcb5ed

    • SHA1

      aa6ffa9fd89b441fe396e1db4c44db6eeb395b70

    • SHA256

      02fa1f741e37ea101004782d4b74f44619d37aea6dbfbc443bbd9f04f2791e02

    • SHA512

      b587cef7f419db00c5e9bc63b6690b23c63811784de6c615a90014ad4aea35d379dca4a7eb311b8222c6a01277a8a305a9182c03f4c9cff6ac5343b4c352164a

    • SSDEEP

      3072:O92qSmHOhnWpPI1ybmJIiC00PArIojHTYVBCn+rs3Ss3qLMTerLA:O9NSMOEpQ1Q3ODAr+Va

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks