General

  • Target

    JaffaCakes118_d57bece7a2e8356ad1aeee08b63958b19b0a4548943f491ee1a593b4c5907e88

  • Size

    188KB

  • Sample

    241223-w8nffsxlg1

  • MD5

    e3110f3382f3fce66980eb126af69e4b

  • SHA1

    c85c21f32eed4dd29aa0c2d1538c55054a8cf790

  • SHA256

    d57bece7a2e8356ad1aeee08b63958b19b0a4548943f491ee1a593b4c5907e88

  • SHA512

    e2ec848693b6be174329b435141d140b76a47c5524a99307d56fd598a2c65c0b75b013c6419e81ed354f98472231fe88b5f0bbfb44573f91240fbddb94c699bf

  • SSDEEP

    3072:rteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzT9qM:jq7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_d57bece7a2e8356ad1aeee08b63958b19b0a4548943f491ee1a593b4c5907e88

    • Size

      188KB

    • MD5

      e3110f3382f3fce66980eb126af69e4b

    • SHA1

      c85c21f32eed4dd29aa0c2d1538c55054a8cf790

    • SHA256

      d57bece7a2e8356ad1aeee08b63958b19b0a4548943f491ee1a593b4c5907e88

    • SHA512

      e2ec848693b6be174329b435141d140b76a47c5524a99307d56fd598a2c65c0b75b013c6419e81ed354f98472231fe88b5f0bbfb44573f91240fbddb94c699bf

    • SSDEEP

      3072:rteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzT9qM:jq7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks