General

  • Target

    JaffaCakes118_6d60fce7efb89452fc801103faa247d2ce98dacdf3f48984c27bc08a3b3ef0a9

  • Size

    188KB

  • Sample

    241230-25yd5swlbz

  • MD5

    4d8d4e59773db2bc2121f0ee314d7328

  • SHA1

    cf38d8607ea757936f871e8daba3fbd1e9b9a550

  • SHA256

    6d60fce7efb89452fc801103faa247d2ce98dacdf3f48984c27bc08a3b3ef0a9

  • SHA512

    56c032141b7a6a9384cbcca6e0d6212fb241757d2730fddc3a35df74b222566b43af42ffaba87ef18f720533e0547e2e6b480150fbc6c570fdfe3c262e433904

  • SSDEEP

    3072:9teMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzW9qM:Jq7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_6d60fce7efb89452fc801103faa247d2ce98dacdf3f48984c27bc08a3b3ef0a9

    • Size

      188KB

    • MD5

      4d8d4e59773db2bc2121f0ee314d7328

    • SHA1

      cf38d8607ea757936f871e8daba3fbd1e9b9a550

    • SHA256

      6d60fce7efb89452fc801103faa247d2ce98dacdf3f48984c27bc08a3b3ef0a9

    • SHA512

      56c032141b7a6a9384cbcca6e0d6212fb241757d2730fddc3a35df74b222566b43af42ffaba87ef18f720533e0547e2e6b480150fbc6c570fdfe3c262e433904

    • SSDEEP

      3072:9teMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzW9qM:Jq7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks