General

  • Target

    JaffaCakes118_79552dbc0d39125ead7a8af68cf24e1f9625b6893ff665e51baa28f2c43ced08

  • Size

    184KB

  • Sample

    241230-fmw8gayngv

  • MD5

    1f3e546b30d7d2b319bd041b72ca586c

  • SHA1

    cb2e17ff8e3a1331e544332e291f9953bbe2f882

  • SHA256

    79552dbc0d39125ead7a8af68cf24e1f9625b6893ff665e51baa28f2c43ced08

  • SHA512

    f6ccf6e87d5b02306b9112db52fb6a1e6c28b108c277f21ccd3c221cd1299c2e05b7cf83d31a901ea92cc8863a863896004a0ca2efd88a83365270b141dfc33b

  • SSDEEP

    3072:0W8WgWhVnmr6k/6zsRJLNqTXvMU9tb+/HU6ngmGWx9ixCH0u:n8qh+66QsRdNiBW/06ngmGWexC

Malware Config

Extracted

Family

dridex

Botnet

22203

C2

103.75.201.2:443

158.223.1.108:6225

165.22.28.242:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_79552dbc0d39125ead7a8af68cf24e1f9625b6893ff665e51baa28f2c43ced08

    • Size

      184KB

    • MD5

      1f3e546b30d7d2b319bd041b72ca586c

    • SHA1

      cb2e17ff8e3a1331e544332e291f9953bbe2f882

    • SHA256

      79552dbc0d39125ead7a8af68cf24e1f9625b6893ff665e51baa28f2c43ced08

    • SHA512

      f6ccf6e87d5b02306b9112db52fb6a1e6c28b108c277f21ccd3c221cd1299c2e05b7cf83d31a901ea92cc8863a863896004a0ca2efd88a83365270b141dfc33b

    • SSDEEP

      3072:0W8WgWhVnmr6k/6zsRJLNqTXvMU9tb+/HU6ngmGWx9ixCH0u:n8qh+66QsRdNiBW/06ngmGWexC

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks