General

  • Target

    JaffaCakes118_7d8588015472b74afe779e405507a1ae86a11be3d19c9e13bd65a62011db4428

  • Size

    188KB

  • Sample

    241230-11h8zs1lcp

  • MD5

    5d1d9143c0fceaff6c36bfb24720653c

  • SHA1

    9af889c829277be54da6762603a5b12594d17559

  • SHA256

    7d8588015472b74afe779e405507a1ae86a11be3d19c9e13bd65a62011db4428

  • SHA512

    0d0c68d95b2b90dceca5c32cc34778e8c870a2689e1245c57b063bc18d3e9e716bf963f00767388d0af80895e85e9cc346e13a32d3aa2a71bfea23c3f2473d38

  • SSDEEP

    3072:vteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzO9qM:3q7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_7d8588015472b74afe779e405507a1ae86a11be3d19c9e13bd65a62011db4428

    • Size

      188KB

    • MD5

      5d1d9143c0fceaff6c36bfb24720653c

    • SHA1

      9af889c829277be54da6762603a5b12594d17559

    • SHA256

      7d8588015472b74afe779e405507a1ae86a11be3d19c9e13bd65a62011db4428

    • SHA512

      0d0c68d95b2b90dceca5c32cc34778e8c870a2689e1245c57b063bc18d3e9e716bf963f00767388d0af80895e85e9cc346e13a32d3aa2a71bfea23c3f2473d38

    • SSDEEP

      3072:vteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzO9qM:3q7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks