General

  • Target

    JaffaCakes118_8e3e8bb321a3ca0b1366ad85adef6712ef6ab662a1b1c6139c146d412f4d56fc

  • Size

    188KB

  • Sample

    241223-waeqnawnfm

  • MD5

    7985d49c865ee193b48e3564988ea11b

  • SHA1

    9019523e144134fe6935cedee65a797bfdf351ed

  • SHA256

    8e3e8bb321a3ca0b1366ad85adef6712ef6ab662a1b1c6139c146d412f4d56fc

  • SHA512

    d41d879c2fc8378733113fb0918ad0cd6e4f591d13855c76b3951e51e87e5aff0aec1df03fa6eba68cb41ec49ea6325f386f3ad9df6cbd89e9e4a73580699526

  • SSDEEP

    3072:KteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzR9qM:iq7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_8e3e8bb321a3ca0b1366ad85adef6712ef6ab662a1b1c6139c146d412f4d56fc

    • Size

      188KB

    • MD5

      7985d49c865ee193b48e3564988ea11b

    • SHA1

      9019523e144134fe6935cedee65a797bfdf351ed

    • SHA256

      8e3e8bb321a3ca0b1366ad85adef6712ef6ab662a1b1c6139c146d412f4d56fc

    • SHA512

      d41d879c2fc8378733113fb0918ad0cd6e4f591d13855c76b3951e51e87e5aff0aec1df03fa6eba68cb41ec49ea6325f386f3ad9df6cbd89e9e4a73580699526

    • SSDEEP

      3072:KteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzR9qM:iq7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks