General

  • Target

    875a51efc591669e35610a70a8c96b21_JaffaCakes118

  • Size

    184KB

  • Sample

    241102-yfrnhstcne

  • MD5

    875a51efc591669e35610a70a8c96b21

  • SHA1

    0a414c6c24667ed322d12f69ea1c8f85b566e34f

  • SHA256

    3939d44bbc001fcf7b92af29b602044f9a876f39c1a539dde4bc1d09e044d85f

  • SHA512

    376ca9a7c4ab2bb700cf6b75592da99a140aa76b8d4810c109af6ec6956950012f7e5d65c35018d556e57267927b7ed255f0f083d43a339351744c6eaa426d07

  • SSDEEP

    3072:FDHMD9LnP1KxPqM8/1xYTCKJJ+xpm2s7E7jnR1VzGQiEFMFBsvQ:9MhP1cq7/16CT9jnR1Vz7ik

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

137.74.112.43:443

216.108.227.55:6225

94.177.176.51:5723

rc4.plain
rc4.plain

Targets

    • Target

      875a51efc591669e35610a70a8c96b21_JaffaCakes118

    • Size

      184KB

    • MD5

      875a51efc591669e35610a70a8c96b21

    • SHA1

      0a414c6c24667ed322d12f69ea1c8f85b566e34f

    • SHA256

      3939d44bbc001fcf7b92af29b602044f9a876f39c1a539dde4bc1d09e044d85f

    • SHA512

      376ca9a7c4ab2bb700cf6b75592da99a140aa76b8d4810c109af6ec6956950012f7e5d65c35018d556e57267927b7ed255f0f083d43a339351744c6eaa426d07

    • SSDEEP

      3072:FDHMD9LnP1KxPqM8/1xYTCKJJ+xpm2s7E7jnR1VzGQiEFMFBsvQ:9MhP1cq7/16CT9jnR1Vz7ik

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks