General

  • Target

    JaffaCakes118_16d487f86e8a2a98ebcc08ff8d422bb7f9f68f851cdada7634dbea3ec6344d44

  • Size

    188KB

  • Sample

    241230-2ccxqsvjes

  • MD5

    f2cf8d1c80453252caf15c1e7477e373

  • SHA1

    b99c87c93079cf4fa918a6457fcf9f570e12a1d7

  • SHA256

    16d487f86e8a2a98ebcc08ff8d422bb7f9f68f851cdada7634dbea3ec6344d44

  • SHA512

    8710f68ef3c2b1f1dc51a1acca8e9d3e4823b13bfdf2957b6afc95c0fa69abd5a0d83b2c0a34969acb2a5dda52911491dd3bd08800acb01ea7d3eaa2b2493c5b

  • SSDEEP

    3072:TteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzv9qM:bq7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_16d487f86e8a2a98ebcc08ff8d422bb7f9f68f851cdada7634dbea3ec6344d44

    • Size

      188KB

    • MD5

      f2cf8d1c80453252caf15c1e7477e373

    • SHA1

      b99c87c93079cf4fa918a6457fcf9f570e12a1d7

    • SHA256

      16d487f86e8a2a98ebcc08ff8d422bb7f9f68f851cdada7634dbea3ec6344d44

    • SHA512

      8710f68ef3c2b1f1dc51a1acca8e9d3e4823b13bfdf2957b6afc95c0fa69abd5a0d83b2c0a34969acb2a5dda52911491dd3bd08800acb01ea7d3eaa2b2493c5b

    • SSDEEP

      3072:TteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzv9qM:bq7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks