General

  • Target

    JaffaCakes118_ea383edb90746d0b85c4d6f97245b40359962d8e647a323635c1e0d83e89d0d7

  • Size

    188KB

  • Sample

    241224-ngxaaawlfx

  • MD5

    d47152fa4724a806ac655944d92f275a

  • SHA1

    193f2dc40c646fafb851aee6af6ceb762244cdaa

  • SHA256

    ea383edb90746d0b85c4d6f97245b40359962d8e647a323635c1e0d83e89d0d7

  • SHA512

    e00e385542c1140df676fe4f5de1fdb4f80616bcd6562307861741ddbc5880a95452019a30eef3e4ed591a8e3daf5883e0953f0e24d7e37c6f7626bac31c7701

  • SSDEEP

    3072:PteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzU9qM:Xq7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_ea383edb90746d0b85c4d6f97245b40359962d8e647a323635c1e0d83e89d0d7

    • Size

      188KB

    • MD5

      d47152fa4724a806ac655944d92f275a

    • SHA1

      193f2dc40c646fafb851aee6af6ceb762244cdaa

    • SHA256

      ea383edb90746d0b85c4d6f97245b40359962d8e647a323635c1e0d83e89d0d7

    • SHA512

      e00e385542c1140df676fe4f5de1fdb4f80616bcd6562307861741ddbc5880a95452019a30eef3e4ed591a8e3daf5883e0953f0e24d7e37c6f7626bac31c7701

    • SSDEEP

      3072:PteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzU9qM:Xq7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks