General

  • Target

    JaffaCakes118_71ca530c7595c887057c648f4f3799451d0e1a954dad12567405a8aa4ecdc410

  • Size

    184KB

  • Sample

    241230-vw5crs1kel

  • MD5

    a284f628edda51e6f62aa3780a7e3fb2

  • SHA1

    e718ac251cff062f0c0c8b63e8df1116623798c1

  • SHA256

    71ca530c7595c887057c648f4f3799451d0e1a954dad12567405a8aa4ecdc410

  • SHA512

    d492056892b1892e51c121be6dce4de4b4ca7518c20b34fb9173a4b09a76bfb95a4d77ea7f66858835113ac9a57e23aeefd9074c55cadf1a1dd60a1e4e94aa24

  • SSDEEP

    3072:XJQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8Jpa//2uFrSc:kfYOX+wTScR/Xzku9LVw+uG

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_71ca530c7595c887057c648f4f3799451d0e1a954dad12567405a8aa4ecdc410

    • Size

      184KB

    • MD5

      a284f628edda51e6f62aa3780a7e3fb2

    • SHA1

      e718ac251cff062f0c0c8b63e8df1116623798c1

    • SHA256

      71ca530c7595c887057c648f4f3799451d0e1a954dad12567405a8aa4ecdc410

    • SHA512

      d492056892b1892e51c121be6dce4de4b4ca7518c20b34fb9173a4b09a76bfb95a4d77ea7f66858835113ac9a57e23aeefd9074c55cadf1a1dd60a1e4e94aa24

    • SSDEEP

      3072:XJQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8Jpa//2uFrSc:kfYOX+wTScR/Xzku9LVw+uG

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks