General

  • Target

    JaffaCakes118_d75c73698a23f439997111db7760c66939a2e4cbcc037d3161751a07e46bc590

  • Size

    188KB

  • Sample

    241230-14w91s1mgl

  • MD5

    db4c96245c5a743c2c5721be4e30dbb5

  • SHA1

    4f2538b4566e59972e4b11a64a91cd2fcd943624

  • SHA256

    d75c73698a23f439997111db7760c66939a2e4cbcc037d3161751a07e46bc590

  • SHA512

    14a615d47874724d176f61969a176ba64aebcd0ffd3def13b68bfdc18964ff4c96faf4602a5e228fca49a11946e74f7a7473acfc220de70e61cd4faf7fc4918b

  • SSDEEP

    3072:iteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzK9qM:Kq7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_d75c73698a23f439997111db7760c66939a2e4cbcc037d3161751a07e46bc590

    • Size

      188KB

    • MD5

      db4c96245c5a743c2c5721be4e30dbb5

    • SHA1

      4f2538b4566e59972e4b11a64a91cd2fcd943624

    • SHA256

      d75c73698a23f439997111db7760c66939a2e4cbcc037d3161751a07e46bc590

    • SHA512

      14a615d47874724d176f61969a176ba64aebcd0ffd3def13b68bfdc18964ff4c96faf4602a5e228fca49a11946e74f7a7473acfc220de70e61cd4faf7fc4918b

    • SSDEEP

      3072:iteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzK9qM:Kq7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks