General

  • Target

    JaffaCakes118_73365e88acedeeb14a993ceb4811c881d10243813fa7142aba8492e197727433

  • Size

    188KB

  • Sample

    241223-1mzc2ssndr

  • MD5

    df14a64bf82a92a7cdb878c3cec09eb5

  • SHA1

    4c234bf1a3dd463de0ede6437269d8a4142801f3

  • SHA256

    73365e88acedeeb14a993ceb4811c881d10243813fa7142aba8492e197727433

  • SHA512

    d0311e94c7a2528b01c6ef4022d35c4d74023d48ef8556a7f9801db6a3b90afb88f34a58e8f5dcddd060f7c3bf266e6cc5693596446f9c48482c6a01c0fbb1a0

  • SSDEEP

    3072:LteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzq9qM:Dq7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_73365e88acedeeb14a993ceb4811c881d10243813fa7142aba8492e197727433

    • Size

      188KB

    • MD5

      df14a64bf82a92a7cdb878c3cec09eb5

    • SHA1

      4c234bf1a3dd463de0ede6437269d8a4142801f3

    • SHA256

      73365e88acedeeb14a993ceb4811c881d10243813fa7142aba8492e197727433

    • SHA512

      d0311e94c7a2528b01c6ef4022d35c4d74023d48ef8556a7f9801db6a3b90afb88f34a58e8f5dcddd060f7c3bf266e6cc5693596446f9c48482c6a01c0fbb1a0

    • SSDEEP

      3072:LteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzq9qM:Dq7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks