General

  • Target

    JaffaCakes118_cb299aab6b0b9d9e429e495d6079ee10302d32a13c84300867527e2af109dd7b

  • Size

    188KB

  • Sample

    241223-29atmsvlhq

  • MD5

    9278429ea7738797abdd5e42a1badb77

  • SHA1

    132864311d3caca0790e1ad6279877819f54e7dd

  • SHA256

    cb299aab6b0b9d9e429e495d6079ee10302d32a13c84300867527e2af109dd7b

  • SHA512

    5ff53b6839aff537f671b5f9db1c629d041e425b996cdae743ec49b248b8d404919b25ef4afde7855d2374dbeb5a97760dfe45b776ad81c3801abd7032edcd8f

  • SSDEEP

    3072:LteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzq9qM:Dq7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_cb299aab6b0b9d9e429e495d6079ee10302d32a13c84300867527e2af109dd7b

    • Size

      188KB

    • MD5

      9278429ea7738797abdd5e42a1badb77

    • SHA1

      132864311d3caca0790e1ad6279877819f54e7dd

    • SHA256

      cb299aab6b0b9d9e429e495d6079ee10302d32a13c84300867527e2af109dd7b

    • SHA512

      5ff53b6839aff537f671b5f9db1c629d041e425b996cdae743ec49b248b8d404919b25ef4afde7855d2374dbeb5a97760dfe45b776ad81c3801abd7032edcd8f

    • SSDEEP

      3072:LteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzq9qM:Dq7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks