General

  • Target

    JaffaCakes118_941e3184c7ce99414ebd4125278ea6f1d221d21b5f0207b42a847759515aab9d

  • Size

    188KB

  • Sample

    241223-3gwq3svpar

  • MD5

    3ce3336586ed735c20101bc068895580

  • SHA1

    e5cf9faeda3ea8cb54a7d45d4ed0f9f524f60ccc

  • SHA256

    941e3184c7ce99414ebd4125278ea6f1d221d21b5f0207b42a847759515aab9d

  • SHA512

    34f72ec3177b84816dff64a4cc719079213ff969def9ae5908f026d017115264bc7537a6a23aea50c026a7d03f449a615552fa492983019f89d9d43512b30403

  • SSDEEP

    3072:zteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzF9qM:7q7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_941e3184c7ce99414ebd4125278ea6f1d221d21b5f0207b42a847759515aab9d

    • Size

      188KB

    • MD5

      3ce3336586ed735c20101bc068895580

    • SHA1

      e5cf9faeda3ea8cb54a7d45d4ed0f9f524f60ccc

    • SHA256

      941e3184c7ce99414ebd4125278ea6f1d221d21b5f0207b42a847759515aab9d

    • SHA512

      34f72ec3177b84816dff64a4cc719079213ff969def9ae5908f026d017115264bc7537a6a23aea50c026a7d03f449a615552fa492983019f89d9d43512b30403

    • SSDEEP

      3072:zteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzF9qM:7q7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks