General

  • Target

    JaffaCakes118_0e64a4dc753f90029bbcdc72487751bcb53cf3403aedbb5bc0ce2f046920a070

  • Size

    188KB

  • Sample

    241223-wlhxfswqex

  • MD5

    6f038098c3ab319ef08ed588970415a6

  • SHA1

    c64ec76214f23d6d83809267b7cdb461f5abd3f7

  • SHA256

    0e64a4dc753f90029bbcdc72487751bcb53cf3403aedbb5bc0ce2f046920a070

  • SHA512

    774019ee9ec1e074eea5eae3b4dedc6b0612e5a55a556f737447d563cae0021e85a790bddcb76d322e55864b2f33af88e1e2d5633e776552755308ea56cc3613

  • SSDEEP

    3072:OteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIz+9qM:mq7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_0e64a4dc753f90029bbcdc72487751bcb53cf3403aedbb5bc0ce2f046920a070

    • Size

      188KB

    • MD5

      6f038098c3ab319ef08ed588970415a6

    • SHA1

      c64ec76214f23d6d83809267b7cdb461f5abd3f7

    • SHA256

      0e64a4dc753f90029bbcdc72487751bcb53cf3403aedbb5bc0ce2f046920a070

    • SHA512

      774019ee9ec1e074eea5eae3b4dedc6b0612e5a55a556f737447d563cae0021e85a790bddcb76d322e55864b2f33af88e1e2d5633e776552755308ea56cc3613

    • SSDEEP

      3072:OteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIz+9qM:mq7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks