General

  • Target

    JaffaCakes118_ff9cb41121d20716bd3e19645db05de6867cb2d610fbc1ef65cd27f285606c21

  • Size

    184KB

  • Sample

    241230-eyqz6axrck

  • MD5

    bccf77bef1628febcee41e5dc029ad07

  • SHA1

    9d7bbecc3d097e68d6c4f8d30d8288e7269c6c60

  • SHA256

    ff9cb41121d20716bd3e19645db05de6867cb2d610fbc1ef65cd27f285606c21

  • SHA512

    2b716ca580c8d4d6dc1536114f546fdf5838a523c552c03e56397fec1d9f3c760a1af9699b2de7903bccf8ae54b8a819e9227d94919ff2f7b26cf4a2eeb944c1

  • SSDEEP

    3072:oW8WgWhVnmr6k/6zsRJLNqTXvMU9tb+/HU6ngmQWx9ixCH0u:j8qh+66QsRdNiBW/06ngmQWexC

Malware Config

Extracted

Family

dridex

Botnet

22203

C2

103.75.201.2:443

158.223.1.108:6225

165.22.28.242:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_ff9cb41121d20716bd3e19645db05de6867cb2d610fbc1ef65cd27f285606c21

    • Size

      184KB

    • MD5

      bccf77bef1628febcee41e5dc029ad07

    • SHA1

      9d7bbecc3d097e68d6c4f8d30d8288e7269c6c60

    • SHA256

      ff9cb41121d20716bd3e19645db05de6867cb2d610fbc1ef65cd27f285606c21

    • SHA512

      2b716ca580c8d4d6dc1536114f546fdf5838a523c552c03e56397fec1d9f3c760a1af9699b2de7903bccf8ae54b8a819e9227d94919ff2f7b26cf4a2eeb944c1

    • SSDEEP

      3072:oW8WgWhVnmr6k/6zsRJLNqTXvMU9tb+/HU6ngmQWx9ixCH0u:j8qh+66QsRdNiBW/06ngmQWexC

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks