General

  • Target

    JaffaCakes118_427d10d5a13853caa8406ec4082ddd79167b79627b8233bda639216b42ec02eb

  • Size

    188KB

  • Sample

    241223-2qqezstqhn

  • MD5

    1e2b8260662962aafe917a28a818bc4d

  • SHA1

    94cce9fcae74dd429b00f3477c96e3cc297e065f

  • SHA256

    427d10d5a13853caa8406ec4082ddd79167b79627b8233bda639216b42ec02eb

  • SHA512

    5e02b072d4cf5bf230d54bbe4ec47c540283e84cf85c7714300844e07b31fb8e5224522ded666ecc244f28cc57bee929dd5edba7a8144bda11f9a25967a77f48

  • SSDEEP

    3072:WteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzg9qM:eq7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_427d10d5a13853caa8406ec4082ddd79167b79627b8233bda639216b42ec02eb

    • Size

      188KB

    • MD5

      1e2b8260662962aafe917a28a818bc4d

    • SHA1

      94cce9fcae74dd429b00f3477c96e3cc297e065f

    • SHA256

      427d10d5a13853caa8406ec4082ddd79167b79627b8233bda639216b42ec02eb

    • SHA512

      5e02b072d4cf5bf230d54bbe4ec47c540283e84cf85c7714300844e07b31fb8e5224522ded666ecc244f28cc57bee929dd5edba7a8144bda11f9a25967a77f48

    • SSDEEP

      3072:WteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzg9qM:eq7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks