General

  • Target

    JaffaCakes118_a07070fc356ce46bb27e94b9e837a3a05e97c58d861fd1bbf0cd0167e4e6b4ad

  • Size

    188KB

  • Sample

    241230-2hphqasjfl

  • MD5

    d071e28cc19bcf25ed5b55908617ff90

  • SHA1

    a78795a4777e571608a8d7ac02d25b569b2a4fcb

  • SHA256

    a07070fc356ce46bb27e94b9e837a3a05e97c58d861fd1bbf0cd0167e4e6b4ad

  • SHA512

    a7dab7d985338d29ad8e821aee100d907efd3b284805c1a4146f5388525c8513f8dd0e076ef055add602f6a84c6d4d7d8a8dc8e4a92da871def9afac6c3c82b6

  • SSDEEP

    3072:HteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIz49qM:fq7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_a07070fc356ce46bb27e94b9e837a3a05e97c58d861fd1bbf0cd0167e4e6b4ad

    • Size

      188KB

    • MD5

      d071e28cc19bcf25ed5b55908617ff90

    • SHA1

      a78795a4777e571608a8d7ac02d25b569b2a4fcb

    • SHA256

      a07070fc356ce46bb27e94b9e837a3a05e97c58d861fd1bbf0cd0167e4e6b4ad

    • SHA512

      a7dab7d985338d29ad8e821aee100d907efd3b284805c1a4146f5388525c8513f8dd0e076ef055add602f6a84c6d4d7d8a8dc8e4a92da871def9afac6c3c82b6

    • SSDEEP

      3072:HteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIz49qM:fq7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks