General

  • Target

    JaffaCakes118_c4e7f470e7a93ec1e5c2b94da9b70875f22f4fdff97807876c077b81ad27d17b

  • Size

    188KB

  • Sample

    241224-dy9lts1jh1

  • MD5

    3e10152da706257cb59d92636017ee39

  • SHA1

    11e00518a1f50c8bd5e34cf627f1f69ac02b432b

  • SHA256

    c4e7f470e7a93ec1e5c2b94da9b70875f22f4fdff97807876c077b81ad27d17b

  • SHA512

    968a086033714256f1e2dfb7aceeaec530a5354ef3fd270ccc905ee2779b006f075f63ad06bb243b54f206f676f1ee198e57f967d37c9e43762f2d7343c022d4

  • SSDEEP

    3072:yteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIz29qM:6q7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_c4e7f470e7a93ec1e5c2b94da9b70875f22f4fdff97807876c077b81ad27d17b

    • Size

      188KB

    • MD5

      3e10152da706257cb59d92636017ee39

    • SHA1

      11e00518a1f50c8bd5e34cf627f1f69ac02b432b

    • SHA256

      c4e7f470e7a93ec1e5c2b94da9b70875f22f4fdff97807876c077b81ad27d17b

    • SHA512

      968a086033714256f1e2dfb7aceeaec530a5354ef3fd270ccc905ee2779b006f075f63ad06bb243b54f206f676f1ee198e57f967d37c9e43762f2d7343c022d4

    • SSDEEP

      3072:yteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIz29qM:6q7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks