General

  • Target

    JaffaCakes118_fbca59797f6483b06e5fe4fb608e7749f51d5ae2ed38a09ad4b573e3d20c2ec7

  • Size

    170KB

  • Sample

    241224-lfz9fatnfv

  • MD5

    743b37b2e38014d453738bcc90a5f255

  • SHA1

    bd87df31ef858e0edea712236aecf41284485eeb

  • SHA256

    fbca59797f6483b06e5fe4fb608e7749f51d5ae2ed38a09ad4b573e3d20c2ec7

  • SHA512

    0a2dfcc19e69638e351f201419c38848374c683494f36a658555eee1af521f5507dde10b1c2f45e2f05f0be68a144414be50546186b69c207cfac0a916cca055

  • SSDEEP

    3072:UV/jTmL3X6TLhgZBxbvRS1ebSi75S5NNZ4n+whXVM9MWdo8erj:UV/jTe38LiI4Oi75izyn+4lm

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

210.65.244.187:443

162.241.41.92:2303

46.231.204.10:8172

185.183.159.100:4125

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_fbca59797f6483b06e5fe4fb608e7749f51d5ae2ed38a09ad4b573e3d20c2ec7

    • Size

      170KB

    • MD5

      743b37b2e38014d453738bcc90a5f255

    • SHA1

      bd87df31ef858e0edea712236aecf41284485eeb

    • SHA256

      fbca59797f6483b06e5fe4fb608e7749f51d5ae2ed38a09ad4b573e3d20c2ec7

    • SHA512

      0a2dfcc19e69638e351f201419c38848374c683494f36a658555eee1af521f5507dde10b1c2f45e2f05f0be68a144414be50546186b69c207cfac0a916cca055

    • SSDEEP

      3072:UV/jTmL3X6TLhgZBxbvRS1ebSi75S5NNZ4n+whXVM9MWdo8erj:UV/jTe38LiI4Oi75izyn+4lm

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks