General

  • Target

    JaffaCakes118_6dee1e81b3d99b8b0da8c73c1b262520fd4722641fc5713c58198d0eea6bdf96

  • Size

    188KB

  • Sample

    241223-v3s83swmam

  • MD5

    416c4bda0bfc4efa1fe8d97fed483629

  • SHA1

    f23cc31e3f05dec6d00d1ec882672ff8d8a5fbc0

  • SHA256

    6dee1e81b3d99b8b0da8c73c1b262520fd4722641fc5713c58198d0eea6bdf96

  • SHA512

    e0667a5e0eae7f8ac12d89343c8df69bcd41b5ef82b9b6e3d24a464c68bdda85da4fff188470236761ab3d30c2557a84ba7e84e19f01a5b4d7052f6fd74ac026

  • SSDEEP

    3072:TteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzp9qM:bq7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_6dee1e81b3d99b8b0da8c73c1b262520fd4722641fc5713c58198d0eea6bdf96

    • Size

      188KB

    • MD5

      416c4bda0bfc4efa1fe8d97fed483629

    • SHA1

      f23cc31e3f05dec6d00d1ec882672ff8d8a5fbc0

    • SHA256

      6dee1e81b3d99b8b0da8c73c1b262520fd4722641fc5713c58198d0eea6bdf96

    • SHA512

      e0667a5e0eae7f8ac12d89343c8df69bcd41b5ef82b9b6e3d24a464c68bdda85da4fff188470236761ab3d30c2557a84ba7e84e19f01a5b4d7052f6fd74ac026

    • SSDEEP

      3072:TteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzp9qM:bq7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks