General

  • Target

    JaffaCakes118_e20fcd774ceecfb2631d14038f1f1c089dca1af4eb2b9e84bad7dd5300147e14

  • Size

    184KB

  • Sample

    241224-ylf4zavre1

  • MD5

    5b42b56a6c72e5b445e10321c8a60c98

  • SHA1

    3f83a5bfa19d134e67ae22388f2ce44e2e63677d

  • SHA256

    e20fcd774ceecfb2631d14038f1f1c089dca1af4eb2b9e84bad7dd5300147e14

  • SHA512

    a17f17075afb229165d96d365528f93bd1dfde024189ad1f6b2f3134cddf0d551337ca8e80e6e9d8ec3960263db01e1308d68b7ee0b0dbb03b41eae73c6767b9

  • SSDEEP

    3072:QuwfhNXphcqs2tJYsoa9Xibolk0CtPBU1jhhF8ZJ8fDo4K7lmsb:+7TXYsd9SkONU1jKGlclm

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

103.75.201.2:443

158.223.1.108:6225

165.22.28.242:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_e20fcd774ceecfb2631d14038f1f1c089dca1af4eb2b9e84bad7dd5300147e14

    • Size

      184KB

    • MD5

      5b42b56a6c72e5b445e10321c8a60c98

    • SHA1

      3f83a5bfa19d134e67ae22388f2ce44e2e63677d

    • SHA256

      e20fcd774ceecfb2631d14038f1f1c089dca1af4eb2b9e84bad7dd5300147e14

    • SHA512

      a17f17075afb229165d96d365528f93bd1dfde024189ad1f6b2f3134cddf0d551337ca8e80e6e9d8ec3960263db01e1308d68b7ee0b0dbb03b41eae73c6767b9

    • SSDEEP

      3072:QuwfhNXphcqs2tJYsoa9Xibolk0CtPBU1jhhF8ZJ8fDo4K7lmsb:+7TXYsd9SkONU1jKGlclm

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks