General

  • Target

    JaffaCakes118_9238bff3383cd12641f7e3c8758ce4370e399f9bdc6834659f35c54bb6f124c2

  • Size

    188KB

  • Sample

    241223-xcg48sxmhw

  • MD5

    69af19c6da241c9682f9f6002b939e9e

  • SHA1

    8ecd4723fa99f21319b4c68895843f484ca487f0

  • SHA256

    9238bff3383cd12641f7e3c8758ce4370e399f9bdc6834659f35c54bb6f124c2

  • SHA512

    e28c51ec28c40c0b4814ac0378c70040641ed25a7238cc61d4a747b239e842dfb6d3bf3ec47cc56d94aa7651146fcdfe072db3385b6e0550c32f987c52887d01

  • SSDEEP

    3072:ateMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzr9qM:Sq7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_9238bff3383cd12641f7e3c8758ce4370e399f9bdc6834659f35c54bb6f124c2

    • Size

      188KB

    • MD5

      69af19c6da241c9682f9f6002b939e9e

    • SHA1

      8ecd4723fa99f21319b4c68895843f484ca487f0

    • SHA256

      9238bff3383cd12641f7e3c8758ce4370e399f9bdc6834659f35c54bb6f124c2

    • SHA512

      e28c51ec28c40c0b4814ac0378c70040641ed25a7238cc61d4a747b239e842dfb6d3bf3ec47cc56d94aa7651146fcdfe072db3385b6e0550c32f987c52887d01

    • SSDEEP

      3072:ateMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzr9qM:Sq7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks