General

  • Target

    JaffaCakes118_4617af64614a7fff9b59fa93ad050b59fcde3a84ff78c00a8da3649798fedf1b

  • Size

    188KB

  • Sample

    241223-1v7pdssqeq

  • MD5

    eaabceee0ccd16eb8a60d219d0c0b9f5

  • SHA1

    2aed642ce9b1e42b54658066f5d53cc1809a1826

  • SHA256

    4617af64614a7fff9b59fa93ad050b59fcde3a84ff78c00a8da3649798fedf1b

  • SHA512

    3be04ce1ca83416b079c995b5701a3ab53dde72f2c951b895a06c82a2a854a82a373773687bc9e1814d768e1bdc7ab64f1c3afed73daf8647f560fd9b3db7297

  • SSDEEP

    3072:HteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzS9qM:fq7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_4617af64614a7fff9b59fa93ad050b59fcde3a84ff78c00a8da3649798fedf1b

    • Size

      188KB

    • MD5

      eaabceee0ccd16eb8a60d219d0c0b9f5

    • SHA1

      2aed642ce9b1e42b54658066f5d53cc1809a1826

    • SHA256

      4617af64614a7fff9b59fa93ad050b59fcde3a84ff78c00a8da3649798fedf1b

    • SHA512

      3be04ce1ca83416b079c995b5701a3ab53dde72f2c951b895a06c82a2a854a82a373773687bc9e1814d768e1bdc7ab64f1c3afed73daf8647f560fd9b3db7297

    • SSDEEP

      3072:HteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzS9qM:fq7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks