General

  • Target

    JaffaCakes118_b592edc9e8b1ea9b694ede7f47edb1053d4e93a44d92baf9fed32aed24f7a518

  • Size

    184KB

  • Sample

    241230-v18wra1lhj

  • MD5

    2477102739b616f7f71b2a853749e4bb

  • SHA1

    50540d83cb217de5f839eae35449f47ab03d3e1d

  • SHA256

    b592edc9e8b1ea9b694ede7f47edb1053d4e93a44d92baf9fed32aed24f7a518

  • SHA512

    436713ddee1bcdf40a3441d7c05fe914bb75816b2faa3317a30d79ea7c6fdd0d9d7b0bd4d12c5494df8eb1bcb9639caf6bdece60aa51540c348dbde4d0ed4504

  • SSDEEP

    3072:E92qSmHOhnWpPI1ybmJIiC00PArIojHTYVBCn+rs3Ss3qLMTrrLA:E9NSMOEpQ1Q3ODAr+V7

Malware Config

Extracted

Family

dridex

Botnet

22203

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_b592edc9e8b1ea9b694ede7f47edb1053d4e93a44d92baf9fed32aed24f7a518

    • Size

      184KB

    • MD5

      2477102739b616f7f71b2a853749e4bb

    • SHA1

      50540d83cb217de5f839eae35449f47ab03d3e1d

    • SHA256

      b592edc9e8b1ea9b694ede7f47edb1053d4e93a44d92baf9fed32aed24f7a518

    • SHA512

      436713ddee1bcdf40a3441d7c05fe914bb75816b2faa3317a30d79ea7c6fdd0d9d7b0bd4d12c5494df8eb1bcb9639caf6bdece60aa51540c348dbde4d0ed4504

    • SSDEEP

      3072:E92qSmHOhnWpPI1ybmJIiC00PArIojHTYVBCn+rs3Ss3qLMTrrLA:E9NSMOEpQ1Q3ODAr+V7

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks