General

  • Target

    JaffaCakes118_f2621816b4e26ac2faa4e7a9a219a96ec239685c6a36ce21163840bf61fb2b32

  • Size

    184KB

  • Sample

    241230-yndfvswlgk

  • MD5

    89e34af7dfb8e6435ec1ca77b5c3ff71

  • SHA1

    b865f18284a96a4e63b0feab75144b9c03f41e8f

  • SHA256

    f2621816b4e26ac2faa4e7a9a219a96ec239685c6a36ce21163840bf61fb2b32

  • SHA512

    4209ef9312678d13f595b4edc518c99a1875b6e131ef46f4a8a3557bc79f50c91a2bc8516548b8e66f769bcae7b2912babd0d5fd9d04b0ee5d2a0ea1384becf5

  • SSDEEP

    3072:QiLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaonlzoxss7:QiLVCIT4WK2z1W+CUHZj4Skq/eaoVoC

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_f2621816b4e26ac2faa4e7a9a219a96ec239685c6a36ce21163840bf61fb2b32

    • Size

      184KB

    • MD5

      89e34af7dfb8e6435ec1ca77b5c3ff71

    • SHA1

      b865f18284a96a4e63b0feab75144b9c03f41e8f

    • SHA256

      f2621816b4e26ac2faa4e7a9a219a96ec239685c6a36ce21163840bf61fb2b32

    • SHA512

      4209ef9312678d13f595b4edc518c99a1875b6e131ef46f4a8a3557bc79f50c91a2bc8516548b8e66f769bcae7b2912babd0d5fd9d04b0ee5d2a0ea1384becf5

    • SSDEEP

      3072:QiLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaonlzoxss7:QiLVCIT4WK2z1W+CUHZj4Skq/eaoVoC

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks