General

  • Target

    JaffaCakes118_d98bf651c3f27c2e69efa27bac0191e3ea27381865561d5bfb957635fb3bbd65

  • Size

    184KB

  • Sample

    241230-xkf7xatncj

  • MD5

    25396dcc1ea3b9b1aa437b43da26b4f9

  • SHA1

    b8e193b804b3c7d96e220f7060f5f1cc7fce8cf3

  • SHA256

    d98bf651c3f27c2e69efa27bac0191e3ea27381865561d5bfb957635fb3bbd65

  • SHA512

    75f427242fa3e0fce7d555e814c8f6821d4d39f207abf817a983af91be31c44178fd21f8b7e1a3d42eb523bbad23273b1e9673e1d2fb147fd07e5fb3e261fcc6

  • SSDEEP

    3072:HiLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaohlzoxss7:HiLVCIT4WK2z1W+CUHZj4Skq/eao/oC

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_d98bf651c3f27c2e69efa27bac0191e3ea27381865561d5bfb957635fb3bbd65

    • Size

      184KB

    • MD5

      25396dcc1ea3b9b1aa437b43da26b4f9

    • SHA1

      b8e193b804b3c7d96e220f7060f5f1cc7fce8cf3

    • SHA256

      d98bf651c3f27c2e69efa27bac0191e3ea27381865561d5bfb957635fb3bbd65

    • SHA512

      75f427242fa3e0fce7d555e814c8f6821d4d39f207abf817a983af91be31c44178fd21f8b7e1a3d42eb523bbad23273b1e9673e1d2fb147fd07e5fb3e261fcc6

    • SSDEEP

      3072:HiLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaohlzoxss7:HiLVCIT4WK2z1W+CUHZj4Skq/eao/oC

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks