General

  • Target

    JaffaCakes118_222c297d3dcf74145205c539805be918a97fff0ec39a32891547e3b246b90140

  • Size

    188KB

  • Sample

    241224-mvgw3svrhp

  • MD5

    87ff5f571e64718aa424a6ed9c705d27

  • SHA1

    70c824396d251be859bc9ceaab383c8d918e85ab

  • SHA256

    222c297d3dcf74145205c539805be918a97fff0ec39a32891547e3b246b90140

  • SHA512

    55033cfd83f9ff130b94d81c20c4c2c6e107b6f110a16d35d15ebf807b6f98dd7b87116b29ccd0bcc595b6460c7a87dfa30147715c67c11ace23adc50d4b2442

  • SSDEEP

    3072:PteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzG9qM:Xq7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_222c297d3dcf74145205c539805be918a97fff0ec39a32891547e3b246b90140

    • Size

      188KB

    • MD5

      87ff5f571e64718aa424a6ed9c705d27

    • SHA1

      70c824396d251be859bc9ceaab383c8d918e85ab

    • SHA256

      222c297d3dcf74145205c539805be918a97fff0ec39a32891547e3b246b90140

    • SHA512

      55033cfd83f9ff130b94d81c20c4c2c6e107b6f110a16d35d15ebf807b6f98dd7b87116b29ccd0bcc595b6460c7a87dfa30147715c67c11ace23adc50d4b2442

    • SSDEEP

      3072:PteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzG9qM:Xq7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks