General

  • Target

    JaffaCakes118_60dbc1bf3aefc307d689a7479d2377c6b88a87c5ad8dfc833002036467561098

  • Size

    188KB

  • Sample

    241224-agjgjawkhs

  • MD5

    5b01c9f13a00a3ef9b410fb10a516c97

  • SHA1

    78276f9877ebc5fb218d9a9c9988777aab24d3df

  • SHA256

    60dbc1bf3aefc307d689a7479d2377c6b88a87c5ad8dfc833002036467561098

  • SHA512

    86b59010d267e7bec30b38ef782bb9e62c8be66e71a32761caca0ee0c8c0b0b3d6968305bc036eef99303d78837d56f79dbfe933b6eabe0183b952cbe8d54d4d

  • SSDEEP

    3072:RteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzq9qM:9q7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_60dbc1bf3aefc307d689a7479d2377c6b88a87c5ad8dfc833002036467561098

    • Size

      188KB

    • MD5

      5b01c9f13a00a3ef9b410fb10a516c97

    • SHA1

      78276f9877ebc5fb218d9a9c9988777aab24d3df

    • SHA256

      60dbc1bf3aefc307d689a7479d2377c6b88a87c5ad8dfc833002036467561098

    • SHA512

      86b59010d267e7bec30b38ef782bb9e62c8be66e71a32761caca0ee0c8c0b0b3d6968305bc036eef99303d78837d56f79dbfe933b6eabe0183b952cbe8d54d4d

    • SSDEEP

      3072:RteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzq9qM:9q7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks