General

  • Target

    JaffaCakes118_c3e616803f626c55731b6251c3f04a59a89fb81e1c0eed4ced04d80211cdf3b5

  • Size

    184KB

  • Sample

    241230-1p1znasrhw

  • MD5

    d1b88bb027fbb6cb484108508d261c77

  • SHA1

    d33a4ac276694cd310e6c6f1bae10f7759cb3bde

  • SHA256

    c3e616803f626c55731b6251c3f04a59a89fb81e1c0eed4ced04d80211cdf3b5

  • SHA512

    37dd9577c5769c1b44cf4eaf57d16c9222e64eac4a01e3e2f6587669405673d5923f2d433da0d3010d47b11a0faff5159fdb0829d481f1b6b9e3bc414a003e23

  • SSDEEP

    3072:kgkQz1PuOprc+kq6VNOe3qbarVEpZlcbBacS9nOdgXdA4l:BPFkq6zOe5ilSanOsd

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.75.201.2:443

158.223.1.108:6225

165.22.28.242:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_c3e616803f626c55731b6251c3f04a59a89fb81e1c0eed4ced04d80211cdf3b5

    • Size

      184KB

    • MD5

      d1b88bb027fbb6cb484108508d261c77

    • SHA1

      d33a4ac276694cd310e6c6f1bae10f7759cb3bde

    • SHA256

      c3e616803f626c55731b6251c3f04a59a89fb81e1c0eed4ced04d80211cdf3b5

    • SHA512

      37dd9577c5769c1b44cf4eaf57d16c9222e64eac4a01e3e2f6587669405673d5923f2d433da0d3010d47b11a0faff5159fdb0829d481f1b6b9e3bc414a003e23

    • SSDEEP

      3072:kgkQz1PuOprc+kq6VNOe3qbarVEpZlcbBacS9nOdgXdA4l:BPFkq6zOe5ilSanOsd

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks