General

  • Target

    JaffaCakes118_9467b4b6bcc2c9d67ea06c1397bb693c527310d1126f9fb466f8a8e6b418ad1c

  • Size

    188KB

  • Sample

    241223-1f33naskb1

  • MD5

    9da7e0b6fc06e2d54020191b26e6de2a

  • SHA1

    eeee61aec42f4584e4fb95560c42abd6a5213662

  • SHA256

    9467b4b6bcc2c9d67ea06c1397bb693c527310d1126f9fb466f8a8e6b418ad1c

  • SHA512

    963e371b121612f13482cb3cc7235f6c7fd9c3ec1bc83b73869b2bd6c3ea2752428a74084ac4a484072e8b970e37e325d66335feb59019e95214f2733f295f60

  • SSDEEP

    3072:nteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIz19qM:/q7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_9467b4b6bcc2c9d67ea06c1397bb693c527310d1126f9fb466f8a8e6b418ad1c

    • Size

      188KB

    • MD5

      9da7e0b6fc06e2d54020191b26e6de2a

    • SHA1

      eeee61aec42f4584e4fb95560c42abd6a5213662

    • SHA256

      9467b4b6bcc2c9d67ea06c1397bb693c527310d1126f9fb466f8a8e6b418ad1c

    • SHA512

      963e371b121612f13482cb3cc7235f6c7fd9c3ec1bc83b73869b2bd6c3ea2752428a74084ac4a484072e8b970e37e325d66335feb59019e95214f2733f295f60

    • SSDEEP

      3072:nteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIz19qM:/q7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks