General

  • Target

    JaffaCakes118_e728bfd48856c6688d5f2ec2374adada26ff95a3ffc9ee625eeac262dfb61f6a

  • Size

    188KB

  • Sample

    241224-b4hzysxrhy

  • MD5

    df28e2c1a5620be96fc0f4bfe6c2d002

  • SHA1

    5639cb1cc226007fb690f6c4f6a85c510923d09f

  • SHA256

    e728bfd48856c6688d5f2ec2374adada26ff95a3ffc9ee625eeac262dfb61f6a

  • SHA512

    360117f014643b0b0c274459f1895fd699e1e778361a1e5a8f5227f0dd9f4ddd8e292c6b2aed0dee03dbbd1438d74fd2458c8f6c6491ea831b2b47b752536996

  • SSDEEP

    3072:yteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzQ9qM:6q7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_e728bfd48856c6688d5f2ec2374adada26ff95a3ffc9ee625eeac262dfb61f6a

    • Size

      188KB

    • MD5

      df28e2c1a5620be96fc0f4bfe6c2d002

    • SHA1

      5639cb1cc226007fb690f6c4f6a85c510923d09f

    • SHA256

      e728bfd48856c6688d5f2ec2374adada26ff95a3ffc9ee625eeac262dfb61f6a

    • SHA512

      360117f014643b0b0c274459f1895fd699e1e778361a1e5a8f5227f0dd9f4ddd8e292c6b2aed0dee03dbbd1438d74fd2458c8f6c6491ea831b2b47b752536996

    • SSDEEP

      3072:yteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzQ9qM:6q7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks