General

  • Target

    JaffaCakes118_8cf99500e0ffba95abd311a70b1e1dcf4c93439af39f8e9b4caa3ded0cb67570

  • Size

    188KB

  • Sample

    241223-zrt4fs1meq

  • MD5

    0b6b94c670cb5c2ca311ac2f3ff7d48e

  • SHA1

    2c99aef4e5be23009c9fb5d3174664f0b0228d26

  • SHA256

    8cf99500e0ffba95abd311a70b1e1dcf4c93439af39f8e9b4caa3ded0cb67570

  • SHA512

    c576e9c2b318a2b78a530df5a1cd41a9e4ccfeb184157e2a408d564760412b73a77af3ac2ce7f1233c2fb3f5aede116b8993b31524a636f507b6974727507012

  • SSDEEP

    3072:jteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzV9qM:Lq7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_8cf99500e0ffba95abd311a70b1e1dcf4c93439af39f8e9b4caa3ded0cb67570

    • Size

      188KB

    • MD5

      0b6b94c670cb5c2ca311ac2f3ff7d48e

    • SHA1

      2c99aef4e5be23009c9fb5d3174664f0b0228d26

    • SHA256

      8cf99500e0ffba95abd311a70b1e1dcf4c93439af39f8e9b4caa3ded0cb67570

    • SHA512

      c576e9c2b318a2b78a530df5a1cd41a9e4ccfeb184157e2a408d564760412b73a77af3ac2ce7f1233c2fb3f5aede116b8993b31524a636f507b6974727507012

    • SSDEEP

      3072:jteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzV9qM:Lq7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks