General

  • Target

    JaffaCakes118_9fde5ee41142c317612f7ae8aa1f12a3a2fab47bd8f4dbd95ad093161ac6bc99

  • Size

    184KB

  • Sample

    241221-xpf3psxjbr

  • MD5

    0248e9a4833d9fb7c5999eb4fe3d77df

  • SHA1

    83a3c2c36761822e8b82b732889383d8fff4170c

  • SHA256

    9fde5ee41142c317612f7ae8aa1f12a3a2fab47bd8f4dbd95ad093161ac6bc99

  • SHA512

    6e1179fcf186f3c0d666fafe82d6171130b2d1028de2ad8e96500ba976ad6a023709037d961dbeda1f8e220d1e2033984f9dd5c67e8476ab1c059ef2b84dcbd2

  • SSDEEP

    3072:DuwfhNXphcqs2tJYsoa9Xibolk0CtPBU1jhhF8ZJ8fDo4KGlmsb:R7TXYsd9SkONU1jKGlVlm

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

103.75.201.2:443

158.223.1.108:6225

165.22.28.242:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_9fde5ee41142c317612f7ae8aa1f12a3a2fab47bd8f4dbd95ad093161ac6bc99

    • Size

      184KB

    • MD5

      0248e9a4833d9fb7c5999eb4fe3d77df

    • SHA1

      83a3c2c36761822e8b82b732889383d8fff4170c

    • SHA256

      9fde5ee41142c317612f7ae8aa1f12a3a2fab47bd8f4dbd95ad093161ac6bc99

    • SHA512

      6e1179fcf186f3c0d666fafe82d6171130b2d1028de2ad8e96500ba976ad6a023709037d961dbeda1f8e220d1e2033984f9dd5c67e8476ab1c059ef2b84dcbd2

    • SSDEEP

      3072:DuwfhNXphcqs2tJYsoa9Xibolk0CtPBU1jhhF8ZJ8fDo4KGlmsb:R7TXYsd9SkONU1jKGlVlm

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks