General

  • Target

    JaffaCakes118_4ebac0ad9b680b516e84aef0a3247a697197158b2e5d64437e8cbe2c4e970f84

  • Size

    184KB

  • Sample

    241230-y1n35azkft

  • MD5

    9fd91f6be5a49a4cdd906de1811f9323

  • SHA1

    d3cfc8f1a235767db983b7ad8418e8dd7df1cb97

  • SHA256

    4ebac0ad9b680b516e84aef0a3247a697197158b2e5d64437e8cbe2c4e970f84

  • SHA512

    4d67c0dc1b7e399bf48759d2acb6e68a2f0a7d58227524bdbc01d8616bc14b1ef0eca6774bff9a1e667294157096dec4fe4295d0ef0225fac07efcc60c92d729

  • SSDEEP

    3072:9JQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8J4a//2uFrSc:GfYOX+wTScR/Xzku9LVwDuG

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_4ebac0ad9b680b516e84aef0a3247a697197158b2e5d64437e8cbe2c4e970f84

    • Size

      184KB

    • MD5

      9fd91f6be5a49a4cdd906de1811f9323

    • SHA1

      d3cfc8f1a235767db983b7ad8418e8dd7df1cb97

    • SHA256

      4ebac0ad9b680b516e84aef0a3247a697197158b2e5d64437e8cbe2c4e970f84

    • SHA512

      4d67c0dc1b7e399bf48759d2acb6e68a2f0a7d58227524bdbc01d8616bc14b1ef0eca6774bff9a1e667294157096dec4fe4295d0ef0225fac07efcc60c92d729

    • SSDEEP

      3072:9JQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8J4a//2uFrSc:GfYOX+wTScR/Xzku9LVwDuG

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks