General

  • Target

    JaffaCakes118_e8ca036bf710f75007266d06c8b02f22f45453db1616f6c5a37651ecd523958e

  • Size

    188KB

  • Sample

    241224-k94chstncn

  • MD5

    d525d4b53c687401cd92ba232c8e06f5

  • SHA1

    cbd80b68993143d1311964d7d2f3972434c38b20

  • SHA256

    e8ca036bf710f75007266d06c8b02f22f45453db1616f6c5a37651ecd523958e

  • SHA512

    2a6da53b0cf761590d671a103e92170cb0af88665c0ad4ddd5ef28db535ccf65ef951ca084c7a08aa11e692abfa07e1559d4c098ace406c28c52221db3f69f54

  • SSDEEP

    3072:IteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzo9qM:sq7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_e8ca036bf710f75007266d06c8b02f22f45453db1616f6c5a37651ecd523958e

    • Size

      188KB

    • MD5

      d525d4b53c687401cd92ba232c8e06f5

    • SHA1

      cbd80b68993143d1311964d7d2f3972434c38b20

    • SHA256

      e8ca036bf710f75007266d06c8b02f22f45453db1616f6c5a37651ecd523958e

    • SHA512

      2a6da53b0cf761590d671a103e92170cb0af88665c0ad4ddd5ef28db535ccf65ef951ca084c7a08aa11e692abfa07e1559d4c098ace406c28c52221db3f69f54

    • SSDEEP

      3072:IteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzo9qM:sq7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks