General

  • Target

    JaffaCakes118_6ac138c5e020c06e93885ad860547897fbf8645edc9e5515d2858120fa92be2d

  • Size

    188KB

  • Sample

    241224-dt1hcszrhw

  • MD5

    7a5c484c9716bd6b457e03441fddd300

  • SHA1

    2838874a10f9d9abbe275e3465511078166d1bf5

  • SHA256

    6ac138c5e020c06e93885ad860547897fbf8645edc9e5515d2858120fa92be2d

  • SHA512

    2f05ec976788e24624108143bf2088040e4acc49d9833e1d4c5f5df3a771e0066e2c96a8b72b3c02e867379e4839166a1fad68003fc816b8626fc48c37a5195a

  • SSDEEP

    3072:dteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzR9qM:pq7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_6ac138c5e020c06e93885ad860547897fbf8645edc9e5515d2858120fa92be2d

    • Size

      188KB

    • MD5

      7a5c484c9716bd6b457e03441fddd300

    • SHA1

      2838874a10f9d9abbe275e3465511078166d1bf5

    • SHA256

      6ac138c5e020c06e93885ad860547897fbf8645edc9e5515d2858120fa92be2d

    • SHA512

      2f05ec976788e24624108143bf2088040e4acc49d9833e1d4c5f5df3a771e0066e2c96a8b72b3c02e867379e4839166a1fad68003fc816b8626fc48c37a5195a

    • SSDEEP

      3072:dteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzR9qM:pq7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks