General

  • Target

    JaffaCakes118_08beb6c68e1b6e23bbfaf500f0f7c14156ea327b27d0a7cca7e72568bc2a74b9

  • Size

    188KB

  • Sample

    241223-xvk9lsxrht

  • MD5

    5649be4137fe00e7e12f701a679cb7f6

  • SHA1

    9ed6a305715ae503153d2bc0fd79bce26102e57a

  • SHA256

    08beb6c68e1b6e23bbfaf500f0f7c14156ea327b27d0a7cca7e72568bc2a74b9

  • SHA512

    265c6a1f33012da34ef20f3a567c27a33668e8c82166edeee48187ce2f5bded97f8ddb9222ce80eb13f607ebe172710e78845afc3774362b2f46a1acf76bb684

  • SSDEEP

    3072:rteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzi9qM:jq7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_08beb6c68e1b6e23bbfaf500f0f7c14156ea327b27d0a7cca7e72568bc2a74b9

    • Size

      188KB

    • MD5

      5649be4137fe00e7e12f701a679cb7f6

    • SHA1

      9ed6a305715ae503153d2bc0fd79bce26102e57a

    • SHA256

      08beb6c68e1b6e23bbfaf500f0f7c14156ea327b27d0a7cca7e72568bc2a74b9

    • SHA512

      265c6a1f33012da34ef20f3a567c27a33668e8c82166edeee48187ce2f5bded97f8ddb9222ce80eb13f607ebe172710e78845afc3774362b2f46a1acf76bb684

    • SSDEEP

      3072:rteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzi9qM:jq7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks