General

  • Target

    JaffaCakes118_7b5c34fe5b9f670dd77124f4728b483d25b88352ccd3a89d01c19ef4987a657e

  • Size

    188KB

  • Sample

    241223-zgjvqs1jej

  • MD5

    6c047c84f137d99b42e0ca3a66e4961e

  • SHA1

    0514fdfefc0a618cbc9ad5775c89460d35979cbc

  • SHA256

    7b5c34fe5b9f670dd77124f4728b483d25b88352ccd3a89d01c19ef4987a657e

  • SHA512

    a7bfb8e6d72bf76e0d9e400f271b4fe384d95174e1e5c2d73a39b9a3250f39f5da81e0d6b8349cfa007be354139973f82ce4cc79a222f503ec57a9dd745c6527

  • SSDEEP

    3072:OteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzy9qM:mq7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_7b5c34fe5b9f670dd77124f4728b483d25b88352ccd3a89d01c19ef4987a657e

    • Size

      188KB

    • MD5

      6c047c84f137d99b42e0ca3a66e4961e

    • SHA1

      0514fdfefc0a618cbc9ad5775c89460d35979cbc

    • SHA256

      7b5c34fe5b9f670dd77124f4728b483d25b88352ccd3a89d01c19ef4987a657e

    • SHA512

      a7bfb8e6d72bf76e0d9e400f271b4fe384d95174e1e5c2d73a39b9a3250f39f5da81e0d6b8349cfa007be354139973f82ce4cc79a222f503ec57a9dd745c6527

    • SSDEEP

      3072:OteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzy9qM:mq7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks