General

  • Target

    JaffaCakes118_91b5ce001d867cc84cdff25c9f4b7f36fe3a3925f682973a2d1f542730c2fed4

  • Size

    184KB

  • Sample

    241230-2ny94sslfl

  • MD5

    43b4dd8faa37997b333b49d27505d3d9

  • SHA1

    20d3077bcaf7f00c2b32ad05bb13de5a6811f32c

  • SHA256

    91b5ce001d867cc84cdff25c9f4b7f36fe3a3925f682973a2d1f542730c2fed4

  • SHA512

    69de6ba992e31f5bcf5f246fe8e6fdef3d46dd43e5f8e477c2e9ddbc7497685fa346ab309fca53a66fa1f680ff07afd123f276ecf018e093558fd62bac4d8cd1

  • SSDEEP

    3072:7uwfhNXphcqs2tJYsoa9Xibolk0CtPBU1jhhF8ZJ8fDo4KRlmsb:57TXYsd9SkONU1jKGlelm

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

103.75.201.2:443

158.223.1.108:6225

165.22.28.242:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_91b5ce001d867cc84cdff25c9f4b7f36fe3a3925f682973a2d1f542730c2fed4

    • Size

      184KB

    • MD5

      43b4dd8faa37997b333b49d27505d3d9

    • SHA1

      20d3077bcaf7f00c2b32ad05bb13de5a6811f32c

    • SHA256

      91b5ce001d867cc84cdff25c9f4b7f36fe3a3925f682973a2d1f542730c2fed4

    • SHA512

      69de6ba992e31f5bcf5f246fe8e6fdef3d46dd43e5f8e477c2e9ddbc7497685fa346ab309fca53a66fa1f680ff07afd123f276ecf018e093558fd62bac4d8cd1

    • SSDEEP

      3072:7uwfhNXphcqs2tJYsoa9Xibolk0CtPBU1jhhF8ZJ8fDo4KRlmsb:57TXYsd9SkONU1jKGlelm

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks