General

  • Target

    JaffaCakes118_410aa6c7981377762551ecae4153a30a3774164d7b5aaa6e45e93df5c30a10f0

  • Size

    188KB

  • Sample

    241224-a3sx4awqgs

  • MD5

    5cb0da737fdbb43f066986b9fcaecf73

  • SHA1

    ae266f225ef90dffda457624949e36c1e99a7e3c

  • SHA256

    410aa6c7981377762551ecae4153a30a3774164d7b5aaa6e45e93df5c30a10f0

  • SHA512

    5f4d2444e2e80a7ffeca8692b8f3df855a9d1565318076c848c0b1f0bc8f97741345d7e3dfaaebc0109df64ab2aabef50870e928cd314c78d79f3bd9c8a1dff6

  • SSDEEP

    3072:1teMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzT9qM:Rq7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_410aa6c7981377762551ecae4153a30a3774164d7b5aaa6e45e93df5c30a10f0

    • Size

      188KB

    • MD5

      5cb0da737fdbb43f066986b9fcaecf73

    • SHA1

      ae266f225ef90dffda457624949e36c1e99a7e3c

    • SHA256

      410aa6c7981377762551ecae4153a30a3774164d7b5aaa6e45e93df5c30a10f0

    • SHA512

      5f4d2444e2e80a7ffeca8692b8f3df855a9d1565318076c848c0b1f0bc8f97741345d7e3dfaaebc0109df64ab2aabef50870e928cd314c78d79f3bd9c8a1dff6

    • SSDEEP

      3072:1teMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzT9qM:Rq7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks