General

  • Target

    JaffaCakes118_9ae0c2d811ac42a2927cc7f3a8308fe7b48bdacaa9edcabbddfd1a3a7235dac2

  • Size

    188KB

  • Sample

    241224-c6g14szkhz

  • MD5

    52cc75bbe0d8192503deeb53c6f0b8cc

  • SHA1

    5a84b11c34da8e19306760d64c335ce771095fc6

  • SHA256

    9ae0c2d811ac42a2927cc7f3a8308fe7b48bdacaa9edcabbddfd1a3a7235dac2

  • SHA512

    4e933483fd7b128895c58fefc15a81393de0a0332d9924464ad783988a801ab2e60cf85a2553121966526864b45b4a1f3e2da4e74e7625285fb2e25b9b108395

  • SSDEEP

    3072:ZteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIz29qM:1q7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_9ae0c2d811ac42a2927cc7f3a8308fe7b48bdacaa9edcabbddfd1a3a7235dac2

    • Size

      188KB

    • MD5

      52cc75bbe0d8192503deeb53c6f0b8cc

    • SHA1

      5a84b11c34da8e19306760d64c335ce771095fc6

    • SHA256

      9ae0c2d811ac42a2927cc7f3a8308fe7b48bdacaa9edcabbddfd1a3a7235dac2

    • SHA512

      4e933483fd7b128895c58fefc15a81393de0a0332d9924464ad783988a801ab2e60cf85a2553121966526864b45b4a1f3e2da4e74e7625285fb2e25b9b108395

    • SSDEEP

      3072:ZteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIz29qM:1q7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks