General

  • Target

    JaffaCakes118_b813aea2b67913a186dc12406589569791acec94c6b8afede3af1397893e56d0

  • Size

    188KB

  • Sample

    241224-cxbsqszkcp

  • MD5

    da1b3ab821700468f9cf02288309b1df

  • SHA1

    a5043ab933350788a0a91d38ecf72a63f08d9aca

  • SHA256

    b813aea2b67913a186dc12406589569791acec94c6b8afede3af1397893e56d0

  • SHA512

    1d9cc0fb74c48693de8cd47d5425ca89b72b63ca67e9a4b8322c895791bcdcd772487ae8ee08da588d239918a2891ba6e153ee3bfbf75d85ebe08289cc29921a

  • SSDEEP

    3072:9teMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzG9qM:Jq7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_b813aea2b67913a186dc12406589569791acec94c6b8afede3af1397893e56d0

    • Size

      188KB

    • MD5

      da1b3ab821700468f9cf02288309b1df

    • SHA1

      a5043ab933350788a0a91d38ecf72a63f08d9aca

    • SHA256

      b813aea2b67913a186dc12406589569791acec94c6b8afede3af1397893e56d0

    • SHA512

      1d9cc0fb74c48693de8cd47d5425ca89b72b63ca67e9a4b8322c895791bcdcd772487ae8ee08da588d239918a2891ba6e153ee3bfbf75d85ebe08289cc29921a

    • SSDEEP

      3072:9teMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzG9qM:Jq7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks