General

  • Target

    JaffaCakes118_e23f6d5ce22768e918bf43c0791075170c11db64c91c053bb0c1c5a921bb85ef

  • Size

    184KB

  • Sample

    241230-vxfe2atkcy

  • MD5

    a02d05f1931f92fe216cc722e651b50f

  • SHA1

    88411f468af35aacc2d5120cb6d6c081c415d85c

  • SHA256

    e23f6d5ce22768e918bf43c0791075170c11db64c91c053bb0c1c5a921bb85ef

  • SHA512

    5a0a6457a30b6d5975379cf6af4c02ad134faea6d8c86c95cd2e93eac4bc9810ac977e5f07494334b429646a94582b209438146707c7415260bf0a9bba11d504

  • SSDEEP

    3072:P92qSmHOhnWpPI1ybmJIiC00PArIojHTYVBCn+rs3Ss3qLMT/rLA:P9NSMOEpQ1Q3ODAr+V3

Malware Config

Extracted

Family

dridex

Botnet

22203

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_e23f6d5ce22768e918bf43c0791075170c11db64c91c053bb0c1c5a921bb85ef

    • Size

      184KB

    • MD5

      a02d05f1931f92fe216cc722e651b50f

    • SHA1

      88411f468af35aacc2d5120cb6d6c081c415d85c

    • SHA256

      e23f6d5ce22768e918bf43c0791075170c11db64c91c053bb0c1c5a921bb85ef

    • SHA512

      5a0a6457a30b6d5975379cf6af4c02ad134faea6d8c86c95cd2e93eac4bc9810ac977e5f07494334b429646a94582b209438146707c7415260bf0a9bba11d504

    • SSDEEP

      3072:P92qSmHOhnWpPI1ybmJIiC00PArIojHTYVBCn+rs3Ss3qLMT/rLA:P9NSMOEpQ1Q3ODAr+V3

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks