General

  • Target

    JaffaCakes118_56f7e5cdb8a0a154b61433aaaa77e30e030c52fdc632a7913193db763daf232a

  • Size

    188KB

  • Sample

    241223-3g4rpavmbz

  • MD5

    513835129f29dd5e9f0636e2d1d0b224

  • SHA1

    a320e06d7208e735edeb2762e3fe2d281a5e7056

  • SHA256

    56f7e5cdb8a0a154b61433aaaa77e30e030c52fdc632a7913193db763daf232a

  • SHA512

    b0ff994621f3b151877cfa3666c15971b0f90d8e8955d93ace089e0e11e2d14653f0697323bbba7e36a6085f6cd57e8dc622a85d41bf7afeaaa596bdbe4ee335

  • SSDEEP

    3072:jteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzv9qM:Lq7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_56f7e5cdb8a0a154b61433aaaa77e30e030c52fdc632a7913193db763daf232a

    • Size

      188KB

    • MD5

      513835129f29dd5e9f0636e2d1d0b224

    • SHA1

      a320e06d7208e735edeb2762e3fe2d281a5e7056

    • SHA256

      56f7e5cdb8a0a154b61433aaaa77e30e030c52fdc632a7913193db763daf232a

    • SHA512

      b0ff994621f3b151877cfa3666c15971b0f90d8e8955d93ace089e0e11e2d14653f0697323bbba7e36a6085f6cd57e8dc622a85d41bf7afeaaa596bdbe4ee335

    • SSDEEP

      3072:jteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzv9qM:Lq7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks