General

  • Target

    JaffaCakes118_3185e6428359a508f80da2610c381cfc77d99d1f1c84b2a55e9f060715ea222c

  • Size

    184KB

  • Sample

    241224-w8e43stmhs

  • MD5

    d1a07ccdf20de4fe051bd1adc994e843

  • SHA1

    5159a1ff01bba3e4cccb42ada3f38f00021b54de

  • SHA256

    3185e6428359a508f80da2610c381cfc77d99d1f1c84b2a55e9f060715ea222c

  • SHA512

    c86fb7e42e471215a54fac09ca8dc92f4b0688beb29e339516d63bb209fa491225b8cb7e666a909ca9da67d5511f3a98467727f2d859e413724357c31467d13a

  • SSDEEP

    3072:guwfhNXphcqs2tJYsoa9Xibolk0CtPBU1jhhF8ZJ8fDo4KTlmsb:O7TXYsd9SkONU1jKGlIlm

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

103.75.201.2:443

158.223.1.108:6225

165.22.28.242:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_3185e6428359a508f80da2610c381cfc77d99d1f1c84b2a55e9f060715ea222c

    • Size

      184KB

    • MD5

      d1a07ccdf20de4fe051bd1adc994e843

    • SHA1

      5159a1ff01bba3e4cccb42ada3f38f00021b54de

    • SHA256

      3185e6428359a508f80da2610c381cfc77d99d1f1c84b2a55e9f060715ea222c

    • SHA512

      c86fb7e42e471215a54fac09ca8dc92f4b0688beb29e339516d63bb209fa491225b8cb7e666a909ca9da67d5511f3a98467727f2d859e413724357c31467d13a

    • SSDEEP

      3072:guwfhNXphcqs2tJYsoa9Xibolk0CtPBU1jhhF8ZJ8fDo4KTlmsb:O7TXYsd9SkONU1jKGlIlm

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks