General

  • Target

    JaffaCakes118_3dd7a963c8daf642a01f5cdee693ccc7809666d1f56cc69b11ace95327cb44b1

  • Size

    188KB

  • Sample

    241223-whnzaswqbn

  • MD5

    dbf8f8263b4057dac19cb8df2efc42fa

  • SHA1

    f77853f7f33c48c3a51fecb1eb130fd1b844ed3b

  • SHA256

    3dd7a963c8daf642a01f5cdee693ccc7809666d1f56cc69b11ace95327cb44b1

  • SHA512

    bd3d2ce9b38bc5b179a74a303711cb6cacdc3ba5d78f465f02ecc50c5bbb610b7a3d0ccf0e44e17b28ac3f356aa6548dc18d44dbf8f9b03f550b5cf1e6793f1b

  • SSDEEP

    3072:3teMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzN9qM:vq7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_3dd7a963c8daf642a01f5cdee693ccc7809666d1f56cc69b11ace95327cb44b1

    • Size

      188KB

    • MD5

      dbf8f8263b4057dac19cb8df2efc42fa

    • SHA1

      f77853f7f33c48c3a51fecb1eb130fd1b844ed3b

    • SHA256

      3dd7a963c8daf642a01f5cdee693ccc7809666d1f56cc69b11ace95327cb44b1

    • SHA512

      bd3d2ce9b38bc5b179a74a303711cb6cacdc3ba5d78f465f02ecc50c5bbb610b7a3d0ccf0e44e17b28ac3f356aa6548dc18d44dbf8f9b03f550b5cf1e6793f1b

    • SSDEEP

      3072:3teMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzN9qM:vq7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks