General

  • Target

    JaffaCakes118_60b603e2d49aecbca13151dae648a9283861082649077f356f241fbbf9fc334d

  • Size

    188KB

  • Sample

    241224-c4eszazkdw

  • MD5

    15931daeaad140377ecc75a1128dd9f7

  • SHA1

    0cc8a28e264a98ddef401da98f8b6051c5ed13b6

  • SHA256

    60b603e2d49aecbca13151dae648a9283861082649077f356f241fbbf9fc334d

  • SHA512

    0931512cfdf0f1462d6b4381d6c2cf1f8460412ea8e825d9c87d65ef7a9df0361789d4a458586a09dd4bf8015b8183672ca66680a7977b440a144bb4502eb187

  • SSDEEP

    3072:WteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzn9qM:eq7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_60b603e2d49aecbca13151dae648a9283861082649077f356f241fbbf9fc334d

    • Size

      188KB

    • MD5

      15931daeaad140377ecc75a1128dd9f7

    • SHA1

      0cc8a28e264a98ddef401da98f8b6051c5ed13b6

    • SHA256

      60b603e2d49aecbca13151dae648a9283861082649077f356f241fbbf9fc334d

    • SHA512

      0931512cfdf0f1462d6b4381d6c2cf1f8460412ea8e825d9c87d65ef7a9df0361789d4a458586a09dd4bf8015b8183672ca66680a7977b440a144bb4502eb187

    • SSDEEP

      3072:WteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzn9qM:eq7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks