General

  • Target

    JaffaCakes118_23920ac9424cac7af5b6d074fa186b8b976115946181ed1eaabad26267e8b25e

  • Size

    184KB

  • Sample

    241223-rrbccaskdm

  • MD5

    be6c092335cac8c32218213a4f516b40

  • SHA1

    6608c27e80e8139aa0f7b3b8cec04d991f25f110

  • SHA256

    23920ac9424cac7af5b6d074fa186b8b976115946181ed1eaabad26267e8b25e

  • SHA512

    a457d3f795937d545087116878c1cb2d28d530c2d783ff94e816f4b63eb54751a0e8827df0f6f03b3bc118098f0782e4901c1393f6907c5c9372b0c09dd7ab59

  • SSDEEP

    3072:BuwfhNXphcqs2tJYsoa9Xibolk0CtPBU1jhhF8ZJ8fDo4KQlmsb:r7TXYsd9SkONU1jKGlrlm

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

103.75.201.2:443

158.223.1.108:6225

165.22.28.242:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_23920ac9424cac7af5b6d074fa186b8b976115946181ed1eaabad26267e8b25e

    • Size

      184KB

    • MD5

      be6c092335cac8c32218213a4f516b40

    • SHA1

      6608c27e80e8139aa0f7b3b8cec04d991f25f110

    • SHA256

      23920ac9424cac7af5b6d074fa186b8b976115946181ed1eaabad26267e8b25e

    • SHA512

      a457d3f795937d545087116878c1cb2d28d530c2d783ff94e816f4b63eb54751a0e8827df0f6f03b3bc118098f0782e4901c1393f6907c5c9372b0c09dd7ab59

    • SSDEEP

      3072:BuwfhNXphcqs2tJYsoa9Xibolk0CtPBU1jhhF8ZJ8fDo4KQlmsb:r7TXYsd9SkONU1jKGlrlm

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks