General

  • Target

    JaffaCakes118_e83229d078e9e70ce48bc7b9d9720160fac0735db9e045d92911090a6a9ccf30

  • Size

    188KB

  • Sample

    241224-dz6ass1mdq

  • MD5

    9df8e86358c95757a9846e2746fb8633

  • SHA1

    de92f3c28dd914272963352c67ccf5909c889b1e

  • SHA256

    e83229d078e9e70ce48bc7b9d9720160fac0735db9e045d92911090a6a9ccf30

  • SHA512

    784d421eaedb20f3068939ded87a1f02ed8918e7e9cdeab612bb175620a494d15bcef2cdad47e14fb1fbef9d8ceb0d453ed89dec0f12b31365fcc1f7d265fc1e

  • SSDEEP

    3072:BteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzy9qM:Nq7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_e83229d078e9e70ce48bc7b9d9720160fac0735db9e045d92911090a6a9ccf30

    • Size

      188KB

    • MD5

      9df8e86358c95757a9846e2746fb8633

    • SHA1

      de92f3c28dd914272963352c67ccf5909c889b1e

    • SHA256

      e83229d078e9e70ce48bc7b9d9720160fac0735db9e045d92911090a6a9ccf30

    • SHA512

      784d421eaedb20f3068939ded87a1f02ed8918e7e9cdeab612bb175620a494d15bcef2cdad47e14fb1fbef9d8ceb0d453ed89dec0f12b31365fcc1f7d265fc1e

    • SSDEEP

      3072:BteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzy9qM:Nq7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks