General

  • Target

    JaffaCakes118_52bfcd938fe60af060dc505e14ec3180886e45ab3405417729215b1602c628b5

  • Size

    184KB

  • Sample

    241230-bv923stkds

  • MD5

    11aa5582e63114a835883f2d5b5e9ef8

  • SHA1

    0ab33ed6bf04f6ab86e1fd8c7fce097939141778

  • SHA256

    52bfcd938fe60af060dc505e14ec3180886e45ab3405417729215b1602c628b5

  • SHA512

    bc29cbe582a5ff6e06119e82666225408822c748d18e5c58875b9f464526e5c8923972389e45f91a233058fcb8658a78d0f91db4b945aa98aa509d1d18aedbb1

  • SSDEEP

    3072:wuwfhNXphcqs2tJYsoa9Xibolk0CtPBU1jhhF8ZJ8fDo4Ktlmsb:e7TXYsd9SkONU1jKGlWlm

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

103.75.201.2:443

158.223.1.108:6225

165.22.28.242:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_52bfcd938fe60af060dc505e14ec3180886e45ab3405417729215b1602c628b5

    • Size

      184KB

    • MD5

      11aa5582e63114a835883f2d5b5e9ef8

    • SHA1

      0ab33ed6bf04f6ab86e1fd8c7fce097939141778

    • SHA256

      52bfcd938fe60af060dc505e14ec3180886e45ab3405417729215b1602c628b5

    • SHA512

      bc29cbe582a5ff6e06119e82666225408822c748d18e5c58875b9f464526e5c8923972389e45f91a233058fcb8658a78d0f91db4b945aa98aa509d1d18aedbb1

    • SSDEEP

      3072:wuwfhNXphcqs2tJYsoa9Xibolk0CtPBU1jhhF8ZJ8fDo4Ktlmsb:e7TXYsd9SkONU1jKGlWlm

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks