General

  • Target

    JaffaCakes118_ec2529fb5fc9e1b4a57c923c71382dc0d8d16536bfb78dac4874bf96e23cd715

  • Size

    188KB

  • Sample

    241224-cc4m1syndj

  • MD5

    29f3989326f39a055c695caa5c117bcc

  • SHA1

    80f02fee03c588d8c851f2a02d378ad697795298

  • SHA256

    ec2529fb5fc9e1b4a57c923c71382dc0d8d16536bfb78dac4874bf96e23cd715

  • SHA512

    3190507a19cb6df05f4535195695bc67b1e72c859810a4fcaace268ac0bcac03a0f2fae83e22d6c6cce98521a11d71d41155d49264f207168557c5a75292c09f

  • SSDEEP

    3072:nteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIz/9qM:/q7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_ec2529fb5fc9e1b4a57c923c71382dc0d8d16536bfb78dac4874bf96e23cd715

    • Size

      188KB

    • MD5

      29f3989326f39a055c695caa5c117bcc

    • SHA1

      80f02fee03c588d8c851f2a02d378ad697795298

    • SHA256

      ec2529fb5fc9e1b4a57c923c71382dc0d8d16536bfb78dac4874bf96e23cd715

    • SHA512

      3190507a19cb6df05f4535195695bc67b1e72c859810a4fcaace268ac0bcac03a0f2fae83e22d6c6cce98521a11d71d41155d49264f207168557c5a75292c09f

    • SSDEEP

      3072:nteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIz/9qM:/q7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks