General

  • Target

    JaffaCakes118_bbf992b09780b7d0a9c59ae3df9be8809a572d52e13810a36967126b9d0a8b0c

  • Size

    162KB

  • Sample

    241230-w22dqsspfl

  • MD5

    349e6ccad4993aa7ab1bff5f74910d1a

  • SHA1

    0b84be12a978d75ce0db0699946bd589464bb589

  • SHA256

    bbf992b09780b7d0a9c59ae3df9be8809a572d52e13810a36967126b9d0a8b0c

  • SHA512

    26a23b88f06fa3f1929fb4f0e64d75799b8ccf91f2150220bc4c1673cbcb80d5b2cf332e911f4d267a90826ea71fa06b1f926633aa5e96375b766cf2263cf256

  • SSDEEP

    3072:8/FbrEzD9N+RiMB00c9/74DXE+JgaV7IPx+e6O/pPtaL+y:GbrE1kvcB74DXZ2Melry

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

203.114.109.124:443

82.165.145.100:6601

94.177.255.18:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_bbf992b09780b7d0a9c59ae3df9be8809a572d52e13810a36967126b9d0a8b0c

    • Size

      162KB

    • MD5

      349e6ccad4993aa7ab1bff5f74910d1a

    • SHA1

      0b84be12a978d75ce0db0699946bd589464bb589

    • SHA256

      bbf992b09780b7d0a9c59ae3df9be8809a572d52e13810a36967126b9d0a8b0c

    • SHA512

      26a23b88f06fa3f1929fb4f0e64d75799b8ccf91f2150220bc4c1673cbcb80d5b2cf332e911f4d267a90826ea71fa06b1f926633aa5e96375b766cf2263cf256

    • SSDEEP

      3072:8/FbrEzD9N+RiMB00c9/74DXE+JgaV7IPx+e6O/pPtaL+y:GbrE1kvcB74DXZ2Melry

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks