General

  • Target

    JaffaCakes118_e0c401d799fd2bd44309bc4217a3a6284ebb49eb2228fe0cf448e40ca71a5fae

  • Size

    188KB

  • Sample

    241224-lhbc4atnht

  • MD5

    6f12974ed00f54124329806a37660897

  • SHA1

    4d57dbeb4fb83beb07a98d549ebe181b935f149d

  • SHA256

    e0c401d799fd2bd44309bc4217a3a6284ebb49eb2228fe0cf448e40ca71a5fae

  • SHA512

    e3822b2b1c6a2dde9d158c6afe36e0d86ae2e82d503fc079ecc86cbec35f13bd24e405b473167a4db9d90f06220d54295d263b088a4678b7bad17665ae3dff96

  • SSDEEP

    3072:3teMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzY9qM:vq7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_e0c401d799fd2bd44309bc4217a3a6284ebb49eb2228fe0cf448e40ca71a5fae

    • Size

      188KB

    • MD5

      6f12974ed00f54124329806a37660897

    • SHA1

      4d57dbeb4fb83beb07a98d549ebe181b935f149d

    • SHA256

      e0c401d799fd2bd44309bc4217a3a6284ebb49eb2228fe0cf448e40ca71a5fae

    • SHA512

      e3822b2b1c6a2dde9d158c6afe36e0d86ae2e82d503fc079ecc86cbec35f13bd24e405b473167a4db9d90f06220d54295d263b088a4678b7bad17665ae3dff96

    • SSDEEP

      3072:3teMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzY9qM:vq7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks