General

  • Target

    JaffaCakes118_d5d5615a045fb9089dcb4a297db431ed91b40b88b03599e4773bfbfe5ec8ab20

  • Size

    188KB

  • Sample

    241224-l5ec9svlfq

  • MD5

    137022e70cfbef5a0ca2c7c6182f3b72

  • SHA1

    1fa1e4e03037ca6f73184031c96b440e15e23d87

  • SHA256

    d5d5615a045fb9089dcb4a297db431ed91b40b88b03599e4773bfbfe5ec8ab20

  • SHA512

    99fbee254df75b0bdab77932f317ee51437c73f43b4a7d19ef9e19533943b8041f1afb97d560f6f7450b00df34ea7f7a52b0644a7122d7e02fb405103b7da769

  • SSDEEP

    3072:QteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIz49qM:Eq7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_d5d5615a045fb9089dcb4a297db431ed91b40b88b03599e4773bfbfe5ec8ab20

    • Size

      188KB

    • MD5

      137022e70cfbef5a0ca2c7c6182f3b72

    • SHA1

      1fa1e4e03037ca6f73184031c96b440e15e23d87

    • SHA256

      d5d5615a045fb9089dcb4a297db431ed91b40b88b03599e4773bfbfe5ec8ab20

    • SHA512

      99fbee254df75b0bdab77932f317ee51437c73f43b4a7d19ef9e19533943b8041f1afb97d560f6f7450b00df34ea7f7a52b0644a7122d7e02fb405103b7da769

    • SSDEEP

      3072:QteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIz49qM:Eq7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks