General

  • Target

    JaffaCakes118_cda224f2dc87e682b2a356aee2ffc7ef6c512c0565cb2460b38b94e61f4f3362

  • Size

    188KB

  • Sample

    241223-wrc86awrgk

  • MD5

    b13d2b7438c4883a4d80abe36445ae00

  • SHA1

    4c9671f29a3896150490ccda30f1a7def4c361ab

  • SHA256

    cda224f2dc87e682b2a356aee2ffc7ef6c512c0565cb2460b38b94e61f4f3362

  • SHA512

    8d6ce8c1513e6a78601d18688e75a18fad42c8ed2df1615cb6b8aafdb9ca035e435f7f1eb815aad8d371b84dfb15f0e820383729c834cf366186f21f73830c3f

  • SSDEEP

    3072:5teMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzR9qM:Vq7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_cda224f2dc87e682b2a356aee2ffc7ef6c512c0565cb2460b38b94e61f4f3362

    • Size

      188KB

    • MD5

      b13d2b7438c4883a4d80abe36445ae00

    • SHA1

      4c9671f29a3896150490ccda30f1a7def4c361ab

    • SHA256

      cda224f2dc87e682b2a356aee2ffc7ef6c512c0565cb2460b38b94e61f4f3362

    • SHA512

      8d6ce8c1513e6a78601d18688e75a18fad42c8ed2df1615cb6b8aafdb9ca035e435f7f1eb815aad8d371b84dfb15f0e820383729c834cf366186f21f73830c3f

    • SSDEEP

      3072:5teMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzR9qM:Vq7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks