General

  • Target

    JaffaCakes118_8b8f65d4fd0218e360d5436980fe2ef20b8324caabd9672e628877b63e3391ce

  • Size

    184KB

  • Sample

    241230-c6al2avqfr

  • MD5

    c83eb1bfea65609c82eb3f6016268bcc

  • SHA1

    8105bfa7e44b88c87ac45e812e0be66757688565

  • SHA256

    8b8f65d4fd0218e360d5436980fe2ef20b8324caabd9672e628877b63e3391ce

  • SHA512

    5daa214f53f2a8bdecf6832550c793adbf551a163d5dfc3e61579bc7e87e1f81d3c42a29743c0238390be86a1032939240024e9f4c541de2e67619fc283df503

  • SSDEEP

    3072:EuwfhNXphcqs2tJYsoa9Xibolk0CtPBU1jhhF8ZJ8fDo4KElmsb:a7TXYsd9SkONU1jKGlXlm

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

103.75.201.2:443

158.223.1.108:6225

165.22.28.242:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_8b8f65d4fd0218e360d5436980fe2ef20b8324caabd9672e628877b63e3391ce

    • Size

      184KB

    • MD5

      c83eb1bfea65609c82eb3f6016268bcc

    • SHA1

      8105bfa7e44b88c87ac45e812e0be66757688565

    • SHA256

      8b8f65d4fd0218e360d5436980fe2ef20b8324caabd9672e628877b63e3391ce

    • SHA512

      5daa214f53f2a8bdecf6832550c793adbf551a163d5dfc3e61579bc7e87e1f81d3c42a29743c0238390be86a1032939240024e9f4c541de2e67619fc283df503

    • SSDEEP

      3072:EuwfhNXphcqs2tJYsoa9Xibolk0CtPBU1jhhF8ZJ8fDo4KElmsb:a7TXYsd9SkONU1jKGlXlm

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks