General

  • Target

    JaffaCakes118_259918dd5a557cbd4cec58d127a7bbb6b47cff17eb1653b49138171ffd5800bc

  • Size

    188KB

  • Sample

    241224-lrwqdsvjcl

  • MD5

    887d8e0a044b48399344bd576e3a7013

  • SHA1

    bf7048943a21127aa8536615cf713cba7ba6a7a5

  • SHA256

    259918dd5a557cbd4cec58d127a7bbb6b47cff17eb1653b49138171ffd5800bc

  • SHA512

    e0772dd4b981d751d1c4e1eec76505123f673f7defffd4ba6c5569725fa2b13dac2fe792593f57d51b106dcdc56bab712e2651b7d6d636761cc4c2ffb696907c

  • SSDEEP

    3072:gteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIz29qM:0q7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_259918dd5a557cbd4cec58d127a7bbb6b47cff17eb1653b49138171ffd5800bc

    • Size

      188KB

    • MD5

      887d8e0a044b48399344bd576e3a7013

    • SHA1

      bf7048943a21127aa8536615cf713cba7ba6a7a5

    • SHA256

      259918dd5a557cbd4cec58d127a7bbb6b47cff17eb1653b49138171ffd5800bc

    • SHA512

      e0772dd4b981d751d1c4e1eec76505123f673f7defffd4ba6c5569725fa2b13dac2fe792593f57d51b106dcdc56bab712e2651b7d6d636761cc4c2ffb696907c

    • SSDEEP

      3072:gteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIz29qM:0q7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks