General

  • Target

    JaffaCakes118_3de5e61e1dc0019760d6fb6dc848deebfd49e1288d48a07138ae0afd9b2840f2

  • Size

    188KB

  • Sample

    241224-ad64eswmbm

  • MD5

    7204a4017fef8e99f786e869cf583770

  • SHA1

    ae2d76d2a89cc0f31fd8372d11985e839dfefb08

  • SHA256

    3de5e61e1dc0019760d6fb6dc848deebfd49e1288d48a07138ae0afd9b2840f2

  • SHA512

    d169a70e5378527ca4205894140c205ffc8d77dda479a8581b3f88bce43d57fcd4dfdf3351676f87d3d88f17fec6d2e44c53c7054a4b103860d3eb99d1ebb5c5

  • SSDEEP

    3072:DteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIze9qM:rq7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_3de5e61e1dc0019760d6fb6dc848deebfd49e1288d48a07138ae0afd9b2840f2

    • Size

      188KB

    • MD5

      7204a4017fef8e99f786e869cf583770

    • SHA1

      ae2d76d2a89cc0f31fd8372d11985e839dfefb08

    • SHA256

      3de5e61e1dc0019760d6fb6dc848deebfd49e1288d48a07138ae0afd9b2840f2

    • SHA512

      d169a70e5378527ca4205894140c205ffc8d77dda479a8581b3f88bce43d57fcd4dfdf3351676f87d3d88f17fec6d2e44c53c7054a4b103860d3eb99d1ebb5c5

    • SSDEEP

      3072:DteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIze9qM:rq7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks