General

  • Target

    JaffaCakes118_875dbc6a45cd5b4c8c3c32ddb4e80c3382f32d7ca1c2e5968f9423602c960537

  • Size

    188KB

  • Sample

    241224-dwe97s1jbz

  • MD5

    85c85088df7e2dafd5363bdc8aab4065

  • SHA1

    0e066e38e65968db8fed2d3f1aa1568e5b508fd8

  • SHA256

    875dbc6a45cd5b4c8c3c32ddb4e80c3382f32d7ca1c2e5968f9423602c960537

  • SHA512

    08e9e3957c3146508a9136940e4c09536c1beca3534a86c1659d272ad5e47a5dcd7c06b164c658d3131e680bf1043599732a3ac9a7c86909512c1c470b41ab2a

  • SSDEEP

    3072:bteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzq9qM:zq7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_875dbc6a45cd5b4c8c3c32ddb4e80c3382f32d7ca1c2e5968f9423602c960537

    • Size

      188KB

    • MD5

      85c85088df7e2dafd5363bdc8aab4065

    • SHA1

      0e066e38e65968db8fed2d3f1aa1568e5b508fd8

    • SHA256

      875dbc6a45cd5b4c8c3c32ddb4e80c3382f32d7ca1c2e5968f9423602c960537

    • SHA512

      08e9e3957c3146508a9136940e4c09536c1beca3534a86c1659d272ad5e47a5dcd7c06b164c658d3131e680bf1043599732a3ac9a7c86909512c1c470b41ab2a

    • SSDEEP

      3072:bteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzq9qM:zq7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks