General

  • Target

    JaffaCakes118_7d0e39ae31049b5ba6f093b9fef541ab5a11a92289ba015ef408d4000f7d4635

  • Size

    188KB

  • Sample

    241223-1c217asjby

  • MD5

    eb22b1bf637b31538544a7428e4ee334

  • SHA1

    2e85f2fdb17a44fe574b51ab34d09b5040428f91

  • SHA256

    7d0e39ae31049b5ba6f093b9fef541ab5a11a92289ba015ef408d4000f7d4635

  • SHA512

    aed801ac564ee0828abb115a98a81d6769f0a9ea57088fbfa85b2de202f1b8281834e51c40795d7098403e8469336da58629e34b2f1c792d194c02d989f92b75

  • SSDEEP

    3072:cteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzu9qM:gq7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_7d0e39ae31049b5ba6f093b9fef541ab5a11a92289ba015ef408d4000f7d4635

    • Size

      188KB

    • MD5

      eb22b1bf637b31538544a7428e4ee334

    • SHA1

      2e85f2fdb17a44fe574b51ab34d09b5040428f91

    • SHA256

      7d0e39ae31049b5ba6f093b9fef541ab5a11a92289ba015ef408d4000f7d4635

    • SHA512

      aed801ac564ee0828abb115a98a81d6769f0a9ea57088fbfa85b2de202f1b8281834e51c40795d7098403e8469336da58629e34b2f1c792d194c02d989f92b75

    • SSDEEP

      3072:cteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzu9qM:gq7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks