General

  • Target

    JaffaCakes118_df30aa4d0e6d0a51217b301ea0650040390693dbcdf91dfce866a5b8c8c86788

  • Size

    184KB

  • Sample

    241230-xjhz4stmhk

  • MD5

    a46b031168a2d16521a93e5715fbfb37

  • SHA1

    ceb42d421f784791f5f2adb3632b3e185b7aa176

  • SHA256

    df30aa4d0e6d0a51217b301ea0650040390693dbcdf91dfce866a5b8c8c86788

  • SHA512

    4d37203cb6cae5275c6f00ccd55b9c0e0059c254bf501f7317182391c8ed517534551bc3ebb18dc750e02b8f2e09e2391b933e07fd4502bee90595febdf2caf1

  • SSDEEP

    3072:VJQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8J5a//2uFrSc:efYOX+wTScR/Xzku9LVwSuG

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_df30aa4d0e6d0a51217b301ea0650040390693dbcdf91dfce866a5b8c8c86788

    • Size

      184KB

    • MD5

      a46b031168a2d16521a93e5715fbfb37

    • SHA1

      ceb42d421f784791f5f2adb3632b3e185b7aa176

    • SHA256

      df30aa4d0e6d0a51217b301ea0650040390693dbcdf91dfce866a5b8c8c86788

    • SHA512

      4d37203cb6cae5275c6f00ccd55b9c0e0059c254bf501f7317182391c8ed517534551bc3ebb18dc750e02b8f2e09e2391b933e07fd4502bee90595febdf2caf1

    • SSDEEP

      3072:VJQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8J5a//2uFrSc:efYOX+wTScR/Xzku9LVwSuG

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks