General

  • Target

    JaffaCakes118_562f1e770b04bdaef3dff2bf92f00522cc6691b16b86465a9ddb275d67db08be

  • Size

    188KB

  • Sample

    241223-xxawnayjd1

  • MD5

    9244e3ab9dfbe08cfff4f1a65b4d9954

  • SHA1

    c6e07f20c2c64504e82515a570fbe82fab342ae8

  • SHA256

    562f1e770b04bdaef3dff2bf92f00522cc6691b16b86465a9ddb275d67db08be

  • SHA512

    32e7eb8cbf647602806fe66f24360b048043592efefb61786fd6e9e5dd2d5db2fe6159a6949072504450ba2b0ae53ab1984d72dbc18295ea0933ab716adca566

  • SSDEEP

    3072:PteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzQ9qM:Xq7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_562f1e770b04bdaef3dff2bf92f00522cc6691b16b86465a9ddb275d67db08be

    • Size

      188KB

    • MD5

      9244e3ab9dfbe08cfff4f1a65b4d9954

    • SHA1

      c6e07f20c2c64504e82515a570fbe82fab342ae8

    • SHA256

      562f1e770b04bdaef3dff2bf92f00522cc6691b16b86465a9ddb275d67db08be

    • SHA512

      32e7eb8cbf647602806fe66f24360b048043592efefb61786fd6e9e5dd2d5db2fe6159a6949072504450ba2b0ae53ab1984d72dbc18295ea0933ab716adca566

    • SSDEEP

      3072:PteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzQ9qM:Xq7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks