General

  • Target

    JaffaCakes118_33f3926336d321f04b9cb70f8b4d50795695b7ae64ea1566eff45e3ead76e64d

  • Size

    188KB

  • Sample

    241223-xl97daxqdq

  • MD5

    54cdfd0211ddda53f7f023f65ec0fb36

  • SHA1

    b4a95e57ddb3b22a8262bd65e725849cd3e00420

  • SHA256

    33f3926336d321f04b9cb70f8b4d50795695b7ae64ea1566eff45e3ead76e64d

  • SHA512

    49f8699cf471d24689d3a7ec57696ca99e5c860c641ab5509c4b376d895800cd9adc80a38eb3822d8a3e5d7307cd35a84df20dd6f8d047a7e5228de7e51e4916

  • SSDEEP

    3072:ZteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIz29qM:1q7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_33f3926336d321f04b9cb70f8b4d50795695b7ae64ea1566eff45e3ead76e64d

    • Size

      188KB

    • MD5

      54cdfd0211ddda53f7f023f65ec0fb36

    • SHA1

      b4a95e57ddb3b22a8262bd65e725849cd3e00420

    • SHA256

      33f3926336d321f04b9cb70f8b4d50795695b7ae64ea1566eff45e3ead76e64d

    • SHA512

      49f8699cf471d24689d3a7ec57696ca99e5c860c641ab5509c4b376d895800cd9adc80a38eb3822d8a3e5d7307cd35a84df20dd6f8d047a7e5228de7e51e4916

    • SSDEEP

      3072:ZteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIz29qM:1q7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks