General

  • Target

    JaffaCakes118_7974794276a6104268dab3c44d8122f31d3209eaa562eaf702450b097be79cdf

  • Size

    184KB

  • Sample

    241230-x6w59avmgp

  • MD5

    2b798dab2b98d8b41d84dc8fbdd1a09b

  • SHA1

    d970d50c4b9f268ee8774cbfe9a464b4cee5f399

  • SHA256

    7974794276a6104268dab3c44d8122f31d3209eaa562eaf702450b097be79cdf

  • SHA512

    fbc145e6e81776f25db86db452364a008823692c080a306cd2f245a49847a12cfa5ff2c36e90e267ba4b5fbee36bf8f11852dcc8c5a3f4d44b3622b83ea784bf

  • SSDEEP

    3072:u92qSmHOhnWpPI1ybmJIiC00PArIojHTYVBCn+rs3Ss3qLMTVrLA:u9NSMOEpQ1Q3ODAr+V9

Malware Config

Extracted

Family

dridex

Botnet

22203

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_7974794276a6104268dab3c44d8122f31d3209eaa562eaf702450b097be79cdf

    • Size

      184KB

    • MD5

      2b798dab2b98d8b41d84dc8fbdd1a09b

    • SHA1

      d970d50c4b9f268ee8774cbfe9a464b4cee5f399

    • SHA256

      7974794276a6104268dab3c44d8122f31d3209eaa562eaf702450b097be79cdf

    • SHA512

      fbc145e6e81776f25db86db452364a008823692c080a306cd2f245a49847a12cfa5ff2c36e90e267ba4b5fbee36bf8f11852dcc8c5a3f4d44b3622b83ea784bf

    • SSDEEP

      3072:u92qSmHOhnWpPI1ybmJIiC00PArIojHTYVBCn+rs3Ss3qLMTVrLA:u9NSMOEpQ1Q3ODAr+V9

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks