General

  • Target

    JaffaCakes118_277708cb5e1e091e7f2686a8671ed325b1fb08f6629f9a81069e40d26fbc42b0

  • Size

    188KB

  • Sample

    241223-ydsg2aypcr

  • MD5

    5f75eea8f0c623dc09c339a992456232

  • SHA1

    467c5bf0a27c28fce25f81f8999a18a6ce0172ba

  • SHA256

    277708cb5e1e091e7f2686a8671ed325b1fb08f6629f9a81069e40d26fbc42b0

  • SHA512

    e444ee9f3327c29872c21905035eb2037f5302c214126429c4f771b0a11296253c8dbdebecd9b57aac3f50761e477172eb3ffe198bed1ba74d24d2d48d1fa648

  • SSDEEP

    3072:eteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIz/9qM:Wq7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_277708cb5e1e091e7f2686a8671ed325b1fb08f6629f9a81069e40d26fbc42b0

    • Size

      188KB

    • MD5

      5f75eea8f0c623dc09c339a992456232

    • SHA1

      467c5bf0a27c28fce25f81f8999a18a6ce0172ba

    • SHA256

      277708cb5e1e091e7f2686a8671ed325b1fb08f6629f9a81069e40d26fbc42b0

    • SHA512

      e444ee9f3327c29872c21905035eb2037f5302c214126429c4f771b0a11296253c8dbdebecd9b57aac3f50761e477172eb3ffe198bed1ba74d24d2d48d1fa648

    • SSDEEP

      3072:eteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIz/9qM:Wq7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks