General

  • Target

    JaffaCakes118_07fa5e7c197b7a1dff3e859627de40a58818b8644510ff68964a6e0e2345af82

  • Size

    188KB

  • Sample

    241224-cw99xazkcn

  • MD5

    35a30050f5cc9393b9b7f2764c1dbdf3

  • SHA1

    4f8417e91a395d764fe89e20a0509d87e79bff09

  • SHA256

    07fa5e7c197b7a1dff3e859627de40a58818b8644510ff68964a6e0e2345af82

  • SHA512

    2c00b2ece2c60f6d69e1170ed1a329361b683caedcfb9660f13910c6f218fd8946fdf019c4f2da2574e17e842bbe99d855a85edf8f042e29f67bcd19585d07be

  • SSDEEP

    3072:CteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIz09qM:qq7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_07fa5e7c197b7a1dff3e859627de40a58818b8644510ff68964a6e0e2345af82

    • Size

      188KB

    • MD5

      35a30050f5cc9393b9b7f2764c1dbdf3

    • SHA1

      4f8417e91a395d764fe89e20a0509d87e79bff09

    • SHA256

      07fa5e7c197b7a1dff3e859627de40a58818b8644510ff68964a6e0e2345af82

    • SHA512

      2c00b2ece2c60f6d69e1170ed1a329361b683caedcfb9660f13910c6f218fd8946fdf019c4f2da2574e17e842bbe99d855a85edf8f042e29f67bcd19585d07be

    • SSDEEP

      3072:CteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIz09qM:qq7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks