General

  • Target

    JaffaCakes118_8664a6b1b11362fce499486ac8403d7bcd8dedc65ffcc1b69664c3a42cffa8c9

  • Size

    184KB

  • Sample

    241230-yxwnsswqfn

  • MD5

    c7e56b4a1240b80679fbff8b39b5dc52

  • SHA1

    15ed9fdf04def7177a2efebf89da4441a742817d

  • SHA256

    8664a6b1b11362fce499486ac8403d7bcd8dedc65ffcc1b69664c3a42cffa8c9

  • SHA512

    e45c21a56c79a1ce1c0fec04c8cb811ff8ef0d9710752dee3bfb7fde62b8e7c5de9359291da7b77fadbd63381cd5c4e03c4af8793375d307b3663a41498b14ff

  • SSDEEP

    3072:dJQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8Jha//2uFrSc:mfYOX+wTScR/Xzku9LVwauG

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_8664a6b1b11362fce499486ac8403d7bcd8dedc65ffcc1b69664c3a42cffa8c9

    • Size

      184KB

    • MD5

      c7e56b4a1240b80679fbff8b39b5dc52

    • SHA1

      15ed9fdf04def7177a2efebf89da4441a742817d

    • SHA256

      8664a6b1b11362fce499486ac8403d7bcd8dedc65ffcc1b69664c3a42cffa8c9

    • SHA512

      e45c21a56c79a1ce1c0fec04c8cb811ff8ef0d9710752dee3bfb7fde62b8e7c5de9359291da7b77fadbd63381cd5c4e03c4af8793375d307b3663a41498b14ff

    • SSDEEP

      3072:dJQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8Jha//2uFrSc:mfYOX+wTScR/Xzku9LVwauG

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks