General

  • Target

    JaffaCakes118_5f606e20d5e08b8c49aed746a008dc443278918c83201ace6a98cb8cff6739fd

  • Size

    188KB

  • Sample

    241223-wwfvvaxjew

  • MD5

    b41fda396a25d8e3f64e80b1c17f14fc

  • SHA1

    afa5ee4aca2ce96ffbe4b56aed5f4504fd245d0d

  • SHA256

    5f606e20d5e08b8c49aed746a008dc443278918c83201ace6a98cb8cff6739fd

  • SHA512

    a4f0670f6ce517b7aefeda4b42a1701a2a15c75f2930d20f454e9b8051fb9d213faca08751254f2b510e8afc147d9fecd667d83ed680834687d3a2b71bb5a8de

  • SSDEEP

    3072:jteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIz/9qM:Lq7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_5f606e20d5e08b8c49aed746a008dc443278918c83201ace6a98cb8cff6739fd

    • Size

      188KB

    • MD5

      b41fda396a25d8e3f64e80b1c17f14fc

    • SHA1

      afa5ee4aca2ce96ffbe4b56aed5f4504fd245d0d

    • SHA256

      5f606e20d5e08b8c49aed746a008dc443278918c83201ace6a98cb8cff6739fd

    • SHA512

      a4f0670f6ce517b7aefeda4b42a1701a2a15c75f2930d20f454e9b8051fb9d213faca08751254f2b510e8afc147d9fecd667d83ed680834687d3a2b71bb5a8de

    • SSDEEP

      3072:jteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIz/9qM:Lq7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks