General

  • Target

    JaffaCakes118_ae5338576143f7cd935b411a1fc547b30c82c18c6251ca31d12b75f9a76d1fef

  • Size

    188KB

  • Sample

    241223-vzz78awkgy

  • MD5

    9b6b2368d3250105e4f53022cfe8e86b

  • SHA1

    991f3130e2f0e365b18d83e4bbf80044bba12773

  • SHA256

    ae5338576143f7cd935b411a1fc547b30c82c18c6251ca31d12b75f9a76d1fef

  • SHA512

    d6f371175d1425770b494c2dd02cd9eebc6ade39a1765862f16bf6a4b8b039b0e1af9b164df35a2034ddfe8586a94e150efd066fd4cd5cf5694997476a2f310d

  • SSDEEP

    3072:steMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzr9qM:Qq7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_ae5338576143f7cd935b411a1fc547b30c82c18c6251ca31d12b75f9a76d1fef

    • Size

      188KB

    • MD5

      9b6b2368d3250105e4f53022cfe8e86b

    • SHA1

      991f3130e2f0e365b18d83e4bbf80044bba12773

    • SHA256

      ae5338576143f7cd935b411a1fc547b30c82c18c6251ca31d12b75f9a76d1fef

    • SHA512

      d6f371175d1425770b494c2dd02cd9eebc6ade39a1765862f16bf6a4b8b039b0e1af9b164df35a2034ddfe8586a94e150efd066fd4cd5cf5694997476a2f310d

    • SSDEEP

      3072:steMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzr9qM:Qq7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks