General

  • Target

    JaffaCakes118_1b67d96add6f9da6243d9305fd5874b1245e4f81dd26002eb1975c2d5296f1d8

  • Size

    188KB

  • Sample

    241223-v6peaswmd1

  • MD5

    8ea32af71c6e7750ea67ab8306cc1bea

  • SHA1

    fe189dee3a50bbb53d813135ec63968c14585ad7

  • SHA256

    1b67d96add6f9da6243d9305fd5874b1245e4f81dd26002eb1975c2d5296f1d8

  • SHA512

    dcda6724e357b3a3a88a10862998b860a0ed26e12e0db5b80bc18eaa1e50a2ce25b318dca9687e7c9a461aa3b8624b9bd0dd996285923fac94a00e53c53dbdbd

  • SSDEEP

    3072:1teMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzA9qM:Rq7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_1b67d96add6f9da6243d9305fd5874b1245e4f81dd26002eb1975c2d5296f1d8

    • Size

      188KB

    • MD5

      8ea32af71c6e7750ea67ab8306cc1bea

    • SHA1

      fe189dee3a50bbb53d813135ec63968c14585ad7

    • SHA256

      1b67d96add6f9da6243d9305fd5874b1245e4f81dd26002eb1975c2d5296f1d8

    • SHA512

      dcda6724e357b3a3a88a10862998b860a0ed26e12e0db5b80bc18eaa1e50a2ce25b318dca9687e7c9a461aa3b8624b9bd0dd996285923fac94a00e53c53dbdbd

    • SSDEEP

      3072:1teMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzA9qM:Rq7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks