General

  • Target

    JaffaCakes118_09b5aba22ee510d20350dd4d5f6bc1e76f27512f36a59dd95c5a8f3f278f733e

  • Size

    188KB

  • Sample

    241230-25hzfswlaw

  • MD5

    870b891d6d60d7dea5266c4d444f8afb

  • SHA1

    cb71c3c6599b3d7bef5b2d9f3ab8c51e53f1c530

  • SHA256

    09b5aba22ee510d20350dd4d5f6bc1e76f27512f36a59dd95c5a8f3f278f733e

  • SHA512

    0ae2d5879e3b377f89fb6cb9953de3688325b3ec0cc06b8d1602932b1631d531723874ba7cb7ad237e2a38f549491f47729a3ce883c3b3d61ea0e107ec63dfa5

  • SSDEEP

    3072:5teMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzY9qM:Vq7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_09b5aba22ee510d20350dd4d5f6bc1e76f27512f36a59dd95c5a8f3f278f733e

    • Size

      188KB

    • MD5

      870b891d6d60d7dea5266c4d444f8afb

    • SHA1

      cb71c3c6599b3d7bef5b2d9f3ab8c51e53f1c530

    • SHA256

      09b5aba22ee510d20350dd4d5f6bc1e76f27512f36a59dd95c5a8f3f278f733e

    • SHA512

      0ae2d5879e3b377f89fb6cb9953de3688325b3ec0cc06b8d1602932b1631d531723874ba7cb7ad237e2a38f549491f47729a3ce883c3b3d61ea0e107ec63dfa5

    • SSDEEP

      3072:5teMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzY9qM:Vq7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks