General

  • Target

    JaffaCakes118_e787b2514267b6280abbfd175de99d21a0798456afafe5bb754d26e2b86a0179

  • Size

    184KB

  • Sample

    241230-yl7a6awlar

  • MD5

    761c318b686c97e8273769c800322c27

  • SHA1

    94fef7a0a26a5484553ea78f76ffc8073146b222

  • SHA256

    e787b2514267b6280abbfd175de99d21a0798456afafe5bb754d26e2b86a0179

  • SHA512

    400d97fa4e7c016c9c7f00a657ae6cf293b058a1ea4135fc6f660abf7aac93a116a380dcaa05bb2d67dc019e728b4ac6cc4e3d87ecd9dc66342d0f20745947db

  • SSDEEP

    3072:3JQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8Jga//2uFrSc:EfYOX+wTScR/Xzku9LVwvuG

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_e787b2514267b6280abbfd175de99d21a0798456afafe5bb754d26e2b86a0179

    • Size

      184KB

    • MD5

      761c318b686c97e8273769c800322c27

    • SHA1

      94fef7a0a26a5484553ea78f76ffc8073146b222

    • SHA256

      e787b2514267b6280abbfd175de99d21a0798456afafe5bb754d26e2b86a0179

    • SHA512

      400d97fa4e7c016c9c7f00a657ae6cf293b058a1ea4135fc6f660abf7aac93a116a380dcaa05bb2d67dc019e728b4ac6cc4e3d87ecd9dc66342d0f20745947db

    • SSDEEP

      3072:3JQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8Jga//2uFrSc:EfYOX+wTScR/Xzku9LVwvuG

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks