General

  • Target

    JaffaCakes118_7fd3e28f2c26434dc1bee460349ab9229e39e1b0cf01ba024ba455d8fea7d740

  • Size

    188KB

  • Sample

    241223-2ktkfstpbr

  • MD5

    8ee38fb730c2fb33efe5a6cdf85c357e

  • SHA1

    e3fd78a74ba00fbf29a7578838823f1646d7d181

  • SHA256

    7fd3e28f2c26434dc1bee460349ab9229e39e1b0cf01ba024ba455d8fea7d740

  • SHA512

    57454d5cde5623699a210a1cfe6a730baa85269fa901f2462f2310d7de0f8e14c92a8f47011553c263d9b8f68b681365929c2920d11002bbea864fe2bd54cae3

  • SSDEEP

    3072:+teMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzn9qM:2q7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_7fd3e28f2c26434dc1bee460349ab9229e39e1b0cf01ba024ba455d8fea7d740

    • Size

      188KB

    • MD5

      8ee38fb730c2fb33efe5a6cdf85c357e

    • SHA1

      e3fd78a74ba00fbf29a7578838823f1646d7d181

    • SHA256

      7fd3e28f2c26434dc1bee460349ab9229e39e1b0cf01ba024ba455d8fea7d740

    • SHA512

      57454d5cde5623699a210a1cfe6a730baa85269fa901f2462f2310d7de0f8e14c92a8f47011553c263d9b8f68b681365929c2920d11002bbea864fe2bd54cae3

    • SSDEEP

      3072:+teMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzn9qM:2q7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks