General

  • Target

    JaffaCakes118_aa8d2c557c6cab8b32dbf68571ab01446ec01f72989053a6941fce8b2f205970

  • Size

    188KB

  • Sample

    241224-bk9zbsxpem

  • MD5

    c1fbce0ca8c72f7216fc3e9dd371888d

  • SHA1

    e4be36837d7b1c777429b1cee3cee59847bb1184

  • SHA256

    aa8d2c557c6cab8b32dbf68571ab01446ec01f72989053a6941fce8b2f205970

  • SHA512

    873187524b3899f08511e53dc34a0842246ba0f62de965aa37c36d1221fedcb7bdb96e7a0d566e3b9b021a22cdc8faaa625db695a8cc550660315739d288b8bd

  • SSDEEP

    3072:xteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzR9qM:dq7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_aa8d2c557c6cab8b32dbf68571ab01446ec01f72989053a6941fce8b2f205970

    • Size

      188KB

    • MD5

      c1fbce0ca8c72f7216fc3e9dd371888d

    • SHA1

      e4be36837d7b1c777429b1cee3cee59847bb1184

    • SHA256

      aa8d2c557c6cab8b32dbf68571ab01446ec01f72989053a6941fce8b2f205970

    • SHA512

      873187524b3899f08511e53dc34a0842246ba0f62de965aa37c36d1221fedcb7bdb96e7a0d566e3b9b021a22cdc8faaa625db695a8cc550660315739d288b8bd

    • SSDEEP

      3072:xteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzR9qM:dq7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks