General

  • Target

    JaffaCakes118_00f2ab84c6b7666e7939f47e985255a630aae5ff9f35ffcbc671b7f817612618

  • Size

    188KB

  • Sample

    241224-b6jdhaylhl

  • MD5

    d0e7bf56693b8539c2201b9f1d307286

  • SHA1

    176415c4e8ed9c8fc47f485a893ea7a9de5c6e0a

  • SHA256

    00f2ab84c6b7666e7939f47e985255a630aae5ff9f35ffcbc671b7f817612618

  • SHA512

    837295352925aa0ac214d306c1b1128f8f3e92749ab3d8c7c62fb6d10d64a8fb2c4c2d37e313ca48573f2dc38ce97c458910910a8ce82f3b1474322ca6373dad

  • SSDEEP

    3072:QteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzR9qM:Eq7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_00f2ab84c6b7666e7939f47e985255a630aae5ff9f35ffcbc671b7f817612618

    • Size

      188KB

    • MD5

      d0e7bf56693b8539c2201b9f1d307286

    • SHA1

      176415c4e8ed9c8fc47f485a893ea7a9de5c6e0a

    • SHA256

      00f2ab84c6b7666e7939f47e985255a630aae5ff9f35ffcbc671b7f817612618

    • SHA512

      837295352925aa0ac214d306c1b1128f8f3e92749ab3d8c7c62fb6d10d64a8fb2c4c2d37e313ca48573f2dc38ce97c458910910a8ce82f3b1474322ca6373dad

    • SSDEEP

      3072:QteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzR9qM:Eq7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks