General

  • Target

    JaffaCakes118_dc8c902b077fb6a59b013651eb921ddcb14e4ad2a10f34cd0bc920b4a0661590

  • Size

    184KB

  • Sample

    241230-wldbzavket

  • MD5

    5886278cb23d75bf121396de75233807

  • SHA1

    a871574ad769cba0542e18dcdc14bc098bdd55e7

  • SHA256

    dc8c902b077fb6a59b013651eb921ddcb14e4ad2a10f34cd0bc920b4a0661590

  • SHA512

    8b131dbd17b48daf2a394ca183410b19fbff39cc68afcf02c0ecba4de1767605f4b8572aca271b30a01ff966e8184ae9bb34abcea6df0bc6dc4d35e6ae2029c0

  • SSDEEP

    3072:+JQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8Jra//2uFrSc:HfYOX+wTScR/Xzku9LVwUuG

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_dc8c902b077fb6a59b013651eb921ddcb14e4ad2a10f34cd0bc920b4a0661590

    • Size

      184KB

    • MD5

      5886278cb23d75bf121396de75233807

    • SHA1

      a871574ad769cba0542e18dcdc14bc098bdd55e7

    • SHA256

      dc8c902b077fb6a59b013651eb921ddcb14e4ad2a10f34cd0bc920b4a0661590

    • SHA512

      8b131dbd17b48daf2a394ca183410b19fbff39cc68afcf02c0ecba4de1767605f4b8572aca271b30a01ff966e8184ae9bb34abcea6df0bc6dc4d35e6ae2029c0

    • SSDEEP

      3072:+JQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8Jra//2uFrSc:HfYOX+wTScR/Xzku9LVwUuG

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks