General

  • Target

    JaffaCakes118_a35b42325738e7f9f2e08885f403569987afb7870a6c8055057d6154e07fdc67

  • Size

    188KB

  • Sample

    241224-lnj77atpg1

  • MD5

    8025c3475c30205f6dae74ba1a089f80

  • SHA1

    cd67b7bb7b87dded33ee124a3e86010277cd5112

  • SHA256

    a35b42325738e7f9f2e08885f403569987afb7870a6c8055057d6154e07fdc67

  • SHA512

    66c533b799a28d2e4c77e0d2baeb85825ed60278b8e1cb1b88c1b4d5b82a13ed1b0f56517a7268a987f1fe2c58299365357c67b183de19429ee66f55b7d619f6

  • SSDEEP

    3072:0teMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzF9qM:Iq7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_a35b42325738e7f9f2e08885f403569987afb7870a6c8055057d6154e07fdc67

    • Size

      188KB

    • MD5

      8025c3475c30205f6dae74ba1a089f80

    • SHA1

      cd67b7bb7b87dded33ee124a3e86010277cd5112

    • SHA256

      a35b42325738e7f9f2e08885f403569987afb7870a6c8055057d6154e07fdc67

    • SHA512

      66c533b799a28d2e4c77e0d2baeb85825ed60278b8e1cb1b88c1b4d5b82a13ed1b0f56517a7268a987f1fe2c58299365357c67b183de19429ee66f55b7d619f6

    • SSDEEP

      3072:0teMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzF9qM:Iq7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks