General

  • Target

    JaffaCakes118_8df09236eb9f2dcef1007d7a75c1984f4f8886a87f39d499d06320b6883ef445

  • Size

    188KB

  • Sample

    241224-lmydestrbr

  • MD5

    8d21e9d2a93d5c581bae44d1ed070979

  • SHA1

    ecb8df160384e6d2a003b4200f92fdc466e64541

  • SHA256

    8df09236eb9f2dcef1007d7a75c1984f4f8886a87f39d499d06320b6883ef445

  • SHA512

    20e939a562f86b1e59cc0cf42474aa9b0b249c7f99ccf92f551da06dd439ceda1cf81dbe5e402329f3a9d0347d7d7aa5f20409f1177705df742c2f621fa1b699

  • SSDEEP

    3072:kteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzY9qM:Yq7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_8df09236eb9f2dcef1007d7a75c1984f4f8886a87f39d499d06320b6883ef445

    • Size

      188KB

    • MD5

      8d21e9d2a93d5c581bae44d1ed070979

    • SHA1

      ecb8df160384e6d2a003b4200f92fdc466e64541

    • SHA256

      8df09236eb9f2dcef1007d7a75c1984f4f8886a87f39d499d06320b6883ef445

    • SHA512

      20e939a562f86b1e59cc0cf42474aa9b0b249c7f99ccf92f551da06dd439ceda1cf81dbe5e402329f3a9d0347d7d7aa5f20409f1177705df742c2f621fa1b699

    • SSDEEP

      3072:kteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzY9qM:Yq7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks