General

  • Target

    JaffaCakes118_98f51448c0cc451a9e955b3d45909270b5b85a07be54bf719d4296c0be96f3ca

  • Size

    184KB

  • Sample

    241230-wj4fdavkaz

  • MD5

    ebce52a97156e8f2d3218fb88fcaa3d8

  • SHA1

    ed211b0550b8edd34eab10d57db3bb87af59db16

  • SHA256

    98f51448c0cc451a9e955b3d45909270b5b85a07be54bf719d4296c0be96f3ca

  • SHA512

    9b0ef1c6f46d3097fcaf48859b4695d4092c456d33e9322851cb2ac61b54dd576524a4faff6d2c3e018a4edf5c0b31ff4a056b16665a788e7bfb59d25f3a5643

  • SSDEEP

    3072:5gkQz1PuOprc+kq6VNOe3qbarVEpZlcbBacS9nOdg0dA4l:gPFkq6zOe5ilSanODd

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.75.201.2:443

158.223.1.108:6225

165.22.28.242:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_98f51448c0cc451a9e955b3d45909270b5b85a07be54bf719d4296c0be96f3ca

    • Size

      184KB

    • MD5

      ebce52a97156e8f2d3218fb88fcaa3d8

    • SHA1

      ed211b0550b8edd34eab10d57db3bb87af59db16

    • SHA256

      98f51448c0cc451a9e955b3d45909270b5b85a07be54bf719d4296c0be96f3ca

    • SHA512

      9b0ef1c6f46d3097fcaf48859b4695d4092c456d33e9322851cb2ac61b54dd576524a4faff6d2c3e018a4edf5c0b31ff4a056b16665a788e7bfb59d25f3a5643

    • SSDEEP

      3072:5gkQz1PuOprc+kq6VNOe3qbarVEpZlcbBacS9nOdg0dA4l:gPFkq6zOe5ilSanODd

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks