General

  • Target

    JaffaCakes118_39fc7a5cb0c2be39257e03983edfe9810563b11cb94b084c2b47de16e338cf37

  • Size

    184KB

  • Sample

    241230-vzabsstlaw

  • MD5

    6729aa0dc70e02946c7156b3b6e782e5

  • SHA1

    2e586752257823cfc447455b644424e862068163

  • SHA256

    39fc7a5cb0c2be39257e03983edfe9810563b11cb94b084c2b47de16e338cf37

  • SHA512

    4bd38b4b35093865f79951c8fbe81e379584d435cf9136bafcad4519f41c2547209d2e8e05ef2c8ea2e047a69efecdcb3ac06bba071ce20fe979f54fd17e993a

  • SSDEEP

    3072:pJQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8JXa//2uFrSc:KfYOX+wTScR/Xzku9LVwIuG

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_39fc7a5cb0c2be39257e03983edfe9810563b11cb94b084c2b47de16e338cf37

    • Size

      184KB

    • MD5

      6729aa0dc70e02946c7156b3b6e782e5

    • SHA1

      2e586752257823cfc447455b644424e862068163

    • SHA256

      39fc7a5cb0c2be39257e03983edfe9810563b11cb94b084c2b47de16e338cf37

    • SHA512

      4bd38b4b35093865f79951c8fbe81e379584d435cf9136bafcad4519f41c2547209d2e8e05ef2c8ea2e047a69efecdcb3ac06bba071ce20fe979f54fd17e993a

    • SSDEEP

      3072:pJQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8JXa//2uFrSc:KfYOX+wTScR/Xzku9LVwIuG

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks