General

  • Target

    JaffaCakes118_a3a43744cc65a07713292e076554fd1959bb9df95c720da07b3988fcb821a778

  • Size

    188KB

  • Sample

    241223-v2nl7swlcx

  • MD5

    48f32c9cf172c3b62578372705900a36

  • SHA1

    3edc4486e9636e07b48c1362d45ed0dd53e3889e

  • SHA256

    a3a43744cc65a07713292e076554fd1959bb9df95c720da07b3988fcb821a778

  • SHA512

    6651cd60a60d37dc95cedb0f919f776e3005d0ac9c10a2f71008cef6fbe79204ccdcd409b5536a6f50fb2144287abea425254e384fb48020bffb1722dba470c4

  • SSDEEP

    3072:vteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzr9qM:3q7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_a3a43744cc65a07713292e076554fd1959bb9df95c720da07b3988fcb821a778

    • Size

      188KB

    • MD5

      48f32c9cf172c3b62578372705900a36

    • SHA1

      3edc4486e9636e07b48c1362d45ed0dd53e3889e

    • SHA256

      a3a43744cc65a07713292e076554fd1959bb9df95c720da07b3988fcb821a778

    • SHA512

      6651cd60a60d37dc95cedb0f919f776e3005d0ac9c10a2f71008cef6fbe79204ccdcd409b5536a6f50fb2144287abea425254e384fb48020bffb1722dba470c4

    • SSDEEP

      3072:vteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzr9qM:3q7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks