General

  • Target

    JaffaCakes118_9236daf0b8d512ca0611cbb2d7233a1bf33168ee126abea52010babf4ba1d5cc

  • Size

    188KB

  • Sample

    241223-wf2sdawpgj

  • MD5

    9ff50b460e04765298f5d88e9483965d

  • SHA1

    68ac43102c9fb57b86286400c382625011303e96

  • SHA256

    9236daf0b8d512ca0611cbb2d7233a1bf33168ee126abea52010babf4ba1d5cc

  • SHA512

    85b44334b00ab30bc8c4a7b3ae3bb23f55cb215ceda08dbe9791d2f5f8afd446c08b85535fdc8d026daaf4b45c1b0a9dd3f56ad0e744770502a79c90ebcfae95

  • SSDEEP

    3072:RteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzy9qM:9q7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_9236daf0b8d512ca0611cbb2d7233a1bf33168ee126abea52010babf4ba1d5cc

    • Size

      188KB

    • MD5

      9ff50b460e04765298f5d88e9483965d

    • SHA1

      68ac43102c9fb57b86286400c382625011303e96

    • SHA256

      9236daf0b8d512ca0611cbb2d7233a1bf33168ee126abea52010babf4ba1d5cc

    • SHA512

      85b44334b00ab30bc8c4a7b3ae3bb23f55cb215ceda08dbe9791d2f5f8afd446c08b85535fdc8d026daaf4b45c1b0a9dd3f56ad0e744770502a79c90ebcfae95

    • SSDEEP

      3072:RteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzy9qM:9q7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks