General

  • Target

    JaffaCakes118_9e0fd29d7d23a43361168836f7f9cce74c89c6dceb1716c0e3f6aad925bbf3a1

  • Size

    184KB

  • Sample

    241230-w6pwhavrft

  • MD5

    b5fc3b3cf0a0f16c02389ffb18066db9

  • SHA1

    b349b37d45fb2502cafdd04d1ddd9a9fbb2da6ca

  • SHA256

    9e0fd29d7d23a43361168836f7f9cce74c89c6dceb1716c0e3f6aad925bbf3a1

  • SHA512

    536901b2afd44f659afeedba9412cc2f6da676eacbdaccd2794c0be074eed370ad114033d4167bbd5c483a576c2054b2a32a12b0c9b02ed69ee7604dad0a33c8

  • SSDEEP

    3072:UJQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8JLa//2uFrSc:ZfYOX+wTScR/Xzku9LVwQuG

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_9e0fd29d7d23a43361168836f7f9cce74c89c6dceb1716c0e3f6aad925bbf3a1

    • Size

      184KB

    • MD5

      b5fc3b3cf0a0f16c02389ffb18066db9

    • SHA1

      b349b37d45fb2502cafdd04d1ddd9a9fbb2da6ca

    • SHA256

      9e0fd29d7d23a43361168836f7f9cce74c89c6dceb1716c0e3f6aad925bbf3a1

    • SHA512

      536901b2afd44f659afeedba9412cc2f6da676eacbdaccd2794c0be074eed370ad114033d4167bbd5c483a576c2054b2a32a12b0c9b02ed69ee7604dad0a33c8

    • SSDEEP

      3072:UJQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8JLa//2uFrSc:ZfYOX+wTScR/Xzku9LVwQuG

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks