General

  • Target

    JaffaCakes118_2d2851d9d895ffd46e7c05425aa6ae3ffc9020c8d159fad513a019c6a7ef4bf7

  • Size

    184KB

  • Sample

    241230-zttkpsyldn

  • MD5

    e82b2df18c76c0d3893ffb6eef039dda

  • SHA1

    ee503fec7eb48e2c71a8a0e1eb486ad0ed2fd524

  • SHA256

    2d2851d9d895ffd46e7c05425aa6ae3ffc9020c8d159fad513a019c6a7ef4bf7

  • SHA512

    3a026ab3065f0f214b6544a93043d7c145e918fc0ace4619951de93d063b4d8d6e831d5363ebeb8b380952b6b28901c1b28f8df3c20cfcb681cdbcc369e16524

  • SSDEEP

    3072:SiLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaomlzoxss7:SiLVCIT4WK2z1W+CUHZj4Skq/eao0oC

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_2d2851d9d895ffd46e7c05425aa6ae3ffc9020c8d159fad513a019c6a7ef4bf7

    • Size

      184KB

    • MD5

      e82b2df18c76c0d3893ffb6eef039dda

    • SHA1

      ee503fec7eb48e2c71a8a0e1eb486ad0ed2fd524

    • SHA256

      2d2851d9d895ffd46e7c05425aa6ae3ffc9020c8d159fad513a019c6a7ef4bf7

    • SHA512

      3a026ab3065f0f214b6544a93043d7c145e918fc0ace4619951de93d063b4d8d6e831d5363ebeb8b380952b6b28901c1b28f8df3c20cfcb681cdbcc369e16524

    • SSDEEP

      3072:SiLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaomlzoxss7:SiLVCIT4WK2z1W+CUHZj4Skq/eao0oC

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks