General

  • Target

    JaffaCakes118_33725d933d15a5bfdd743ea5dc7c9bd31648e0d06cb4377da289ac7378622d00

  • Size

    188KB

  • Sample

    241223-zz95ms1nfs

  • MD5

    38dbe5e1192c66738200576de3902881

  • SHA1

    9f1462c9a38ca77a2e274d79f901947b057b98c6

  • SHA256

    33725d933d15a5bfdd743ea5dc7c9bd31648e0d06cb4377da289ac7378622d00

  • SHA512

    3215aa946da4b4f5ec1bb45e3f45a433a9b166bb904f0c4a1de9d5abebb315fc2105cd674bc8da4c184dcc37242d32a4c441e293f2078d87c3ab7b5f6e2f77ef

  • SSDEEP

    3072:tteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIz29qM:Zq7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_33725d933d15a5bfdd743ea5dc7c9bd31648e0d06cb4377da289ac7378622d00

    • Size

      188KB

    • MD5

      38dbe5e1192c66738200576de3902881

    • SHA1

      9f1462c9a38ca77a2e274d79f901947b057b98c6

    • SHA256

      33725d933d15a5bfdd743ea5dc7c9bd31648e0d06cb4377da289ac7378622d00

    • SHA512

      3215aa946da4b4f5ec1bb45e3f45a433a9b166bb904f0c4a1de9d5abebb315fc2105cd674bc8da4c184dcc37242d32a4c441e293f2078d87c3ab7b5f6e2f77ef

    • SSDEEP

      3072:tteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIz29qM:Zq7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks