General

  • Target

    JaffaCakes118_71e5485b75abba626aef746ab4c7545113a45f4a873d958cebce2ae2f78624fe

  • Size

    188KB

  • Sample

    241224-necg4awngp

  • MD5

    4d2fc971163441da714084a39b6567a3

  • SHA1

    afdb81c637688da44e51cbf9925a47b069e22c45

  • SHA256

    71e5485b75abba626aef746ab4c7545113a45f4a873d958cebce2ae2f78624fe

  • SHA512

    8087f71380b7a673b38fc6d2934190df60825cff0bc6247b9dbfb1f448f8f94c77aff46b78855192fe6279d8248c443ba4399a532cd70941067c8b6593f5973c

  • SSDEEP

    3072:LteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzv9qM:Dq7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_71e5485b75abba626aef746ab4c7545113a45f4a873d958cebce2ae2f78624fe

    • Size

      188KB

    • MD5

      4d2fc971163441da714084a39b6567a3

    • SHA1

      afdb81c637688da44e51cbf9925a47b069e22c45

    • SHA256

      71e5485b75abba626aef746ab4c7545113a45f4a873d958cebce2ae2f78624fe

    • SHA512

      8087f71380b7a673b38fc6d2934190df60825cff0bc6247b9dbfb1f448f8f94c77aff46b78855192fe6279d8248c443ba4399a532cd70941067c8b6593f5973c

    • SSDEEP

      3072:LteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzv9qM:Dq7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks