General

  • Target

    JaffaCakes118_d009753ad38e83d2352f2b76b63fc0ad7bc6b8375d565aaaaa5e7ae0e5d29330

  • Size

    188KB

  • Sample

    241224-ckh2aayqbr

  • MD5

    cafb3991c21463b162d5cd6493627164

  • SHA1

    8361c180da4fd76125660e66bea84f4400f5939d

  • SHA256

    d009753ad38e83d2352f2b76b63fc0ad7bc6b8375d565aaaaa5e7ae0e5d29330

  • SHA512

    7e0ccfec1552ae7f413e317c91c6f51faaed1a46bd6b72d3c8a999d567470873cc3fd962a618847c51dfc42190e29156916a7ddc95a0c7a9e0dcbbe79c9aea1b

  • SSDEEP

    3072:fteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzf9qM:Hq7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_d009753ad38e83d2352f2b76b63fc0ad7bc6b8375d565aaaaa5e7ae0e5d29330

    • Size

      188KB

    • MD5

      cafb3991c21463b162d5cd6493627164

    • SHA1

      8361c180da4fd76125660e66bea84f4400f5939d

    • SHA256

      d009753ad38e83d2352f2b76b63fc0ad7bc6b8375d565aaaaa5e7ae0e5d29330

    • SHA512

      7e0ccfec1552ae7f413e317c91c6f51faaed1a46bd6b72d3c8a999d567470873cc3fd962a618847c51dfc42190e29156916a7ddc95a0c7a9e0dcbbe79c9aea1b

    • SSDEEP

      3072:fteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzf9qM:Hq7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks