General

  • Target

    JaffaCakes118_c8b4b90c41d98337621f4674f5a33d125c57db5e95a3166791ee91365d8f7c8e

  • Size

    184KB

  • Sample

    241230-3hqapawqh1

  • MD5

    ad2fda93f4d0d6773d559c08d760bcc0

  • SHA1

    8654a72f9763507daf57c03df35d2cc777a8bb00

  • SHA256

    c8b4b90c41d98337621f4674f5a33d125c57db5e95a3166791ee91365d8f7c8e

  • SHA512

    62635b23ab9d368b96e904ec4b1e85467303a123d7937da317626861557a8b17dd2fb188a55239ec62130168e22ce9c0f577b2939441ff99e034a5265a7b30e6

  • SSDEEP

    3072:wW8WgWhVnmr6k/6zsRJLNqTXvMU9tb+/HU6ngmmWx9ixCH0u:b8qh+66QsRdNiBW/06ngmmWexC

Malware Config

Extracted

Family

dridex

Botnet

22203

C2

103.75.201.2:443

158.223.1.108:6225

165.22.28.242:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_c8b4b90c41d98337621f4674f5a33d125c57db5e95a3166791ee91365d8f7c8e

    • Size

      184KB

    • MD5

      ad2fda93f4d0d6773d559c08d760bcc0

    • SHA1

      8654a72f9763507daf57c03df35d2cc777a8bb00

    • SHA256

      c8b4b90c41d98337621f4674f5a33d125c57db5e95a3166791ee91365d8f7c8e

    • SHA512

      62635b23ab9d368b96e904ec4b1e85467303a123d7937da317626861557a8b17dd2fb188a55239ec62130168e22ce9c0f577b2939441ff99e034a5265a7b30e6

    • SSDEEP

      3072:wW8WgWhVnmr6k/6zsRJLNqTXvMU9tb+/HU6ngmmWx9ixCH0u:b8qh+66QsRdNiBW/06ngmmWexC

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks