General

  • Target

    JaffaCakes118_fc16b5eb6b71054338cba165f605614f8432ea97f5987668e997f5500b3303df

  • Size

    188KB

  • Sample

    241223-wcm5tawpal

  • MD5

    ca19c0144f8bfc77ff334727ad299d75

  • SHA1

    d1ad035ff2935ecc18e3868b5744b03dacc2e4a9

  • SHA256

    fc16b5eb6b71054338cba165f605614f8432ea97f5987668e997f5500b3303df

  • SHA512

    0e7f3ef385e081bb4ecb30f1d80c6c04f99c4f7ce7576c558a07e7af57c5f4c613a5a3b4d7b8bcf4d1776c9a21457e681d3354438628a03966ce5e68e210fe46

  • SSDEEP

    3072:SteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIz/9qM:aq7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_fc16b5eb6b71054338cba165f605614f8432ea97f5987668e997f5500b3303df

    • Size

      188KB

    • MD5

      ca19c0144f8bfc77ff334727ad299d75

    • SHA1

      d1ad035ff2935ecc18e3868b5744b03dacc2e4a9

    • SHA256

      fc16b5eb6b71054338cba165f605614f8432ea97f5987668e997f5500b3303df

    • SHA512

      0e7f3ef385e081bb4ecb30f1d80c6c04f99c4f7ce7576c558a07e7af57c5f4c613a5a3b4d7b8bcf4d1776c9a21457e681d3354438628a03966ce5e68e210fe46

    • SSDEEP

      3072:SteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIz/9qM:aq7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks