General

  • Target

    JaffaCakes118_fd6951bfa9cb66b3a88283c4979666d4f6dd7803ada10ffc284fbc5e8aa53df9

  • Size

    184KB

  • Sample

    241230-yjg89awkap

  • MD5

    47f4f5917a2a18212f0771b14d296d7e

  • SHA1

    64bba75e5b5e976ea0d7c884cf6c404dbcbf0604

  • SHA256

    fd6951bfa9cb66b3a88283c4979666d4f6dd7803ada10ffc284fbc5e8aa53df9

  • SHA512

    dd5f8ac532c8a85ab231194ca3543aae3627780774efc1f7da0da97c9faa0157f28cd874572358a6a66c5241566dd4200b08729084b0567b6f9f00512a330c3a

  • SSDEEP

    3072:zJQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8Jka//2uFrSc:4fYOX+wTScR/Xzku9LVw/uG

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_fd6951bfa9cb66b3a88283c4979666d4f6dd7803ada10ffc284fbc5e8aa53df9

    • Size

      184KB

    • MD5

      47f4f5917a2a18212f0771b14d296d7e

    • SHA1

      64bba75e5b5e976ea0d7c884cf6c404dbcbf0604

    • SHA256

      fd6951bfa9cb66b3a88283c4979666d4f6dd7803ada10ffc284fbc5e8aa53df9

    • SHA512

      dd5f8ac532c8a85ab231194ca3543aae3627780774efc1f7da0da97c9faa0157f28cd874572358a6a66c5241566dd4200b08729084b0567b6f9f00512a330c3a

    • SSDEEP

      3072:zJQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8Jka//2uFrSc:4fYOX+wTScR/Xzku9LVw/uG

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks