General

  • Target

    JaffaCakes118_074e616d724530a8c809dfd2a634ed67f6c423f48d912959de0543c55db543b8

  • Size

    184KB

  • Sample

    241224-c888dazlhs

  • MD5

    fc35ab3b3340d0f021364307f8bc93b5

  • SHA1

    ac55bfa1c6457ac9465d056b7ac9ea0ff86a5a49

  • SHA256

    074e616d724530a8c809dfd2a634ed67f6c423f48d912959de0543c55db543b8

  • SHA512

    68642bc8cd349b46fe7539de53c021823ba4d1ae50e5f214e93e3bc85463dcb019b34b051f4cc41da81e774fb252a2195795fa33a478d2c08d54aca0a92b1cf3

  • SSDEEP

    3072:igkQz1PuOprc+kq6VNOe3qbarVEpZlcbBacS9nOdg9dA4l:LPFkq6zOe5ilSanO+d

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.75.201.2:443

158.223.1.108:6225

165.22.28.242:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_074e616d724530a8c809dfd2a634ed67f6c423f48d912959de0543c55db543b8

    • Size

      184KB

    • MD5

      fc35ab3b3340d0f021364307f8bc93b5

    • SHA1

      ac55bfa1c6457ac9465d056b7ac9ea0ff86a5a49

    • SHA256

      074e616d724530a8c809dfd2a634ed67f6c423f48d912959de0543c55db543b8

    • SHA512

      68642bc8cd349b46fe7539de53c021823ba4d1ae50e5f214e93e3bc85463dcb019b34b051f4cc41da81e774fb252a2195795fa33a478d2c08d54aca0a92b1cf3

    • SSDEEP

      3072:igkQz1PuOprc+kq6VNOe3qbarVEpZlcbBacS9nOdg9dA4l:LPFkq6zOe5ilSanO+d

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks