General

  • Target

    JaffaCakes118_24cc503fd683dc1a8bcbbbb2f68870eefb8cab24bbeec9700eccc9839f5f8d68

  • Size

    188KB

  • Sample

    241230-2h8xcsvlgt

  • MD5

    26a66b2a131578d508ac0736021ed857

  • SHA1

    57610308a88e7bc4593a983419320afc4f759448

  • SHA256

    24cc503fd683dc1a8bcbbbb2f68870eefb8cab24bbeec9700eccc9839f5f8d68

  • SHA512

    50a615717e5f9292c64e4b3ca8cfaf674049c1550003e93f3775e9ef2d9dcea208d9c80479791df254a19d4559963c19783bff5e1189ba3e550918451be8a31b

  • SSDEEP

    3072:9teMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzn9qM:Jq7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_24cc503fd683dc1a8bcbbbb2f68870eefb8cab24bbeec9700eccc9839f5f8d68

    • Size

      188KB

    • MD5

      26a66b2a131578d508ac0736021ed857

    • SHA1

      57610308a88e7bc4593a983419320afc4f759448

    • SHA256

      24cc503fd683dc1a8bcbbbb2f68870eefb8cab24bbeec9700eccc9839f5f8d68

    • SHA512

      50a615717e5f9292c64e4b3ca8cfaf674049c1550003e93f3775e9ef2d9dcea208d9c80479791df254a19d4559963c19783bff5e1189ba3e550918451be8a31b

    • SSDEEP

      3072:9teMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzn9qM:Jq7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks