General

  • Target

    JaffaCakes118_2043c08fde339559c7d3cc8cd82aafa832e3ff02026895c8f1b12bd9414f7036

  • Size

    188KB

  • Sample

    241230-15nz2atphx

  • MD5

    d26dc94ba248f108681c805faddba615

  • SHA1

    c57013bda6f79dfa216869eacf4ec258a387eb3d

  • SHA256

    2043c08fde339559c7d3cc8cd82aafa832e3ff02026895c8f1b12bd9414f7036

  • SHA512

    ae8c5e2838453ed7938529cb01300753abe0b9cc5ec5f0928a28e33d300f51a5d192b2121713a5734e1d7ae96763c843a480dcf7962a262ee94febda9edad243

  • SSDEEP

    3072:fteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIz19qM:Hq7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_2043c08fde339559c7d3cc8cd82aafa832e3ff02026895c8f1b12bd9414f7036

    • Size

      188KB

    • MD5

      d26dc94ba248f108681c805faddba615

    • SHA1

      c57013bda6f79dfa216869eacf4ec258a387eb3d

    • SHA256

      2043c08fde339559c7d3cc8cd82aafa832e3ff02026895c8f1b12bd9414f7036

    • SHA512

      ae8c5e2838453ed7938529cb01300753abe0b9cc5ec5f0928a28e33d300f51a5d192b2121713a5734e1d7ae96763c843a480dcf7962a262ee94febda9edad243

    • SSDEEP

      3072:fteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIz19qM:Hq7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks