General

  • Target

    JaffaCakes118_1d5cd6ff3b1189f2a0989ad5736c054ab4dd5d24092607ae6829a933a7912257

  • Size

    184KB

  • Sample

    241230-22a5fawjft

  • MD5

    53673fa92a29a8e732da79e53fbbdaf8

  • SHA1

    67878c3f750eb8367a03cfc93dc8fface1a76b9b

  • SHA256

    1d5cd6ff3b1189f2a0989ad5736c054ab4dd5d24092607ae6829a933a7912257

  • SHA512

    33d5fc24bf7dc83a2a1f8f093302146f927df3e3541bb01cb13cfcb4ee4dff94bfa8c51f07fc4e4b23caf243b807c2be0bf3d293b59eaacaea763ac39edab748

  • SSDEEP

    3072:YW8WgWhVnmr6k/6zsRJLNqTXvMU9tb+/HU6ngm0Wx9ixCH0u:z8qh+66QsRdNiBW/06ngm0WexC

Malware Config

Extracted

Family

dridex

Botnet

22203

C2

103.75.201.2:443

158.223.1.108:6225

165.22.28.242:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_1d5cd6ff3b1189f2a0989ad5736c054ab4dd5d24092607ae6829a933a7912257

    • Size

      184KB

    • MD5

      53673fa92a29a8e732da79e53fbbdaf8

    • SHA1

      67878c3f750eb8367a03cfc93dc8fface1a76b9b

    • SHA256

      1d5cd6ff3b1189f2a0989ad5736c054ab4dd5d24092607ae6829a933a7912257

    • SHA512

      33d5fc24bf7dc83a2a1f8f093302146f927df3e3541bb01cb13cfcb4ee4dff94bfa8c51f07fc4e4b23caf243b807c2be0bf3d293b59eaacaea763ac39edab748

    • SSDEEP

      3072:YW8WgWhVnmr6k/6zsRJLNqTXvMU9tb+/HU6ngm0Wx9ixCH0u:z8qh+66QsRdNiBW/06ngm0WexC

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks