General

  • Target

    JaffaCakes118_a8516d05181c30dfc5b3703ae5e690b24c302e5bde132247d0fb392db7386a07

  • Size

    188KB

  • Sample

    241230-12ft9a1lfq

  • MD5

    00c07f93af05501636d1123037699791

  • SHA1

    ab072e4e662edd37c11070751c95f6fb18b30539

  • SHA256

    a8516d05181c30dfc5b3703ae5e690b24c302e5bde132247d0fb392db7386a07

  • SHA512

    7c3831228d461e2966e98f11d40917d8d14b6388716293681a7d91fdfb60316a32508260ab7d02f36a0681dadcdffdf47562d7f931ade2850b5029f172431538

  • SSDEEP

    3072:5teMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzW9qM:Vq7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_a8516d05181c30dfc5b3703ae5e690b24c302e5bde132247d0fb392db7386a07

    • Size

      188KB

    • MD5

      00c07f93af05501636d1123037699791

    • SHA1

      ab072e4e662edd37c11070751c95f6fb18b30539

    • SHA256

      a8516d05181c30dfc5b3703ae5e690b24c302e5bde132247d0fb392db7386a07

    • SHA512

      7c3831228d461e2966e98f11d40917d8d14b6388716293681a7d91fdfb60316a32508260ab7d02f36a0681dadcdffdf47562d7f931ade2850b5029f172431538

    • SSDEEP

      3072:5teMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzW9qM:Vq7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks