General

  • Target

    JaffaCakes118_cd31547430796dd7e5a5d2b782de79b214a3c235214f79fa9ea0c21312c2bc15

  • Size

    188KB

  • Sample

    241224-ajr7fswle1

  • MD5

    d3dfb92a123ac045f03a9886946669c2

  • SHA1

    22cc4c638e28627492a6d90b3f94020d9952aa17

  • SHA256

    cd31547430796dd7e5a5d2b782de79b214a3c235214f79fa9ea0c21312c2bc15

  • SHA512

    deadcd4bfbef0b439fcc4cc145f640a10b884e8c9fc65c3c396e050d1d9ab1f2dd445283eac1f6f95ae7e2122907434fb5e2a28ee4734296c6e1b05a912d5104

  • SSDEEP

    3072:JteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzZ9qM:Fq7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_cd31547430796dd7e5a5d2b782de79b214a3c235214f79fa9ea0c21312c2bc15

    • Size

      188KB

    • MD5

      d3dfb92a123ac045f03a9886946669c2

    • SHA1

      22cc4c638e28627492a6d90b3f94020d9952aa17

    • SHA256

      cd31547430796dd7e5a5d2b782de79b214a3c235214f79fa9ea0c21312c2bc15

    • SHA512

      deadcd4bfbef0b439fcc4cc145f640a10b884e8c9fc65c3c396e050d1d9ab1f2dd445283eac1f6f95ae7e2122907434fb5e2a28ee4734296c6e1b05a912d5104

    • SSDEEP

      3072:JteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzZ9qM:Fq7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks