General

  • Target

    JaffaCakes118_6cd61b73b9ae6f821052c44d0bf04dc1b5e04934b458638599355b3b9e96aff3

  • Size

    188KB

  • Sample

    241224-cngbvsynhs

  • MD5

    c674c4f1de9bd61706624c239fcadf9c

  • SHA1

    2f37d8d08faaacde0500995f60ee41226e77a0c4

  • SHA256

    6cd61b73b9ae6f821052c44d0bf04dc1b5e04934b458638599355b3b9e96aff3

  • SHA512

    6f5c374db2e1c77bb178f8400b8eb28ed97a0a35f296d017347e1bca876a83188d6116616c1460e74d133b851507db05e1991dcb209e1dd299fb401176a4b723

  • SSDEEP

    3072:HteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIz59qM:fq7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_6cd61b73b9ae6f821052c44d0bf04dc1b5e04934b458638599355b3b9e96aff3

    • Size

      188KB

    • MD5

      c674c4f1de9bd61706624c239fcadf9c

    • SHA1

      2f37d8d08faaacde0500995f60ee41226e77a0c4

    • SHA256

      6cd61b73b9ae6f821052c44d0bf04dc1b5e04934b458638599355b3b9e96aff3

    • SHA512

      6f5c374db2e1c77bb178f8400b8eb28ed97a0a35f296d017347e1bca876a83188d6116616c1460e74d133b851507db05e1991dcb209e1dd299fb401176a4b723

    • SSDEEP

      3072:HteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIz59qM:fq7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks