General

  • Target

    JaffaCakes118_6f60939bce1c082d7047662eaf59376cbd4b3e0a57037f67be38d44c65e3d506

  • Size

    184KB

  • Sample

    241230-z67m4askbx

  • MD5

    c65f5f4560d3d862e55fdb9d9afd94f7

  • SHA1

    0b75a81caedb0f11a667ad4bef21d77fd85b20b6

  • SHA256

    6f60939bce1c082d7047662eaf59376cbd4b3e0a57037f67be38d44c65e3d506

  • SHA512

    47e0b2b4d8c108025becccad565b5c4305658f515dac9524011c8d6c8a43835f359da2f03b94e39deb78abad37e3fcb97b27d78048abd001399313182d33869b

  • SSDEEP

    3072:7JQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8JSa//2uFrSc:gfYOX+wTScR/Xzku9LVwRuG

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_6f60939bce1c082d7047662eaf59376cbd4b3e0a57037f67be38d44c65e3d506

    • Size

      184KB

    • MD5

      c65f5f4560d3d862e55fdb9d9afd94f7

    • SHA1

      0b75a81caedb0f11a667ad4bef21d77fd85b20b6

    • SHA256

      6f60939bce1c082d7047662eaf59376cbd4b3e0a57037f67be38d44c65e3d506

    • SHA512

      47e0b2b4d8c108025becccad565b5c4305658f515dac9524011c8d6c8a43835f359da2f03b94e39deb78abad37e3fcb97b27d78048abd001399313182d33869b

    • SSDEEP

      3072:7JQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8JSa//2uFrSc:gfYOX+wTScR/Xzku9LVwRuG

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks