General

  • Target

    JaffaCakes118_2628e4eaed206a9fef89828c7e59cd704908cd78f3e975f8c2ba9d4c38e245a6

  • Size

    184KB

  • Sample

    241230-zw76waymej

  • MD5

    5c04be8d61c27f707e9fcb0c8da9b5cc

  • SHA1

    3617a53f7c80e23985e3d1c9ed8069eaacab9bbf

  • SHA256

    2628e4eaed206a9fef89828c7e59cd704908cd78f3e975f8c2ba9d4c38e245a6

  • SHA512

    c9032b655aaa5b6f06177e56f4488865b1aa892ce59aab4da8a30992c7a39f7e7c85a140f271e2d39dd0710bbf1746b9f65b563d4000131d2c580bda7b727c13

  • SSDEEP

    3072:092qSmHOhnWpPI1ybmJIiC00PArIojHTYVBCn+rs3Ss3qLMTGrLA:09NSMOEpQ1Q3ODAr+Vy

Malware Config

Extracted

Family

dridex

Botnet

22203

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_2628e4eaed206a9fef89828c7e59cd704908cd78f3e975f8c2ba9d4c38e245a6

    • Size

      184KB

    • MD5

      5c04be8d61c27f707e9fcb0c8da9b5cc

    • SHA1

      3617a53f7c80e23985e3d1c9ed8069eaacab9bbf

    • SHA256

      2628e4eaed206a9fef89828c7e59cd704908cd78f3e975f8c2ba9d4c38e245a6

    • SHA512

      c9032b655aaa5b6f06177e56f4488865b1aa892ce59aab4da8a30992c7a39f7e7c85a140f271e2d39dd0710bbf1746b9f65b563d4000131d2c580bda7b727c13

    • SSDEEP

      3072:092qSmHOhnWpPI1ybmJIiC00PArIojHTYVBCn+rs3Ss3qLMTGrLA:09NSMOEpQ1Q3ODAr+Vy

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks