General

  • Target

    JaffaCakes118_6a759feba80237f23dfdb9255bbd2516da61199d26bea07f0cae2ccacabc2966

  • Size

    188KB

  • Sample

    241230-2khg7askdk

  • MD5

    6cdd0853556dddf14ad00f94e788bbb7

  • SHA1

    be10ee2d789524eb615e846da61dce5e5bb97ad5

  • SHA256

    6a759feba80237f23dfdb9255bbd2516da61199d26bea07f0cae2ccacabc2966

  • SHA512

    49d459603752b1000e2f8465643ed7548a5f5f404552c0a6b131934095850ba2ca7544a06ce09f1caa7b52224e54290ab662978c9fbdca7d3e8fc04094e30017

  • SSDEEP

    3072:rteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzm9qM:jq7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_6a759feba80237f23dfdb9255bbd2516da61199d26bea07f0cae2ccacabc2966

    • Size

      188KB

    • MD5

      6cdd0853556dddf14ad00f94e788bbb7

    • SHA1

      be10ee2d789524eb615e846da61dce5e5bb97ad5

    • SHA256

      6a759feba80237f23dfdb9255bbd2516da61199d26bea07f0cae2ccacabc2966

    • SHA512

      49d459603752b1000e2f8465643ed7548a5f5f404552c0a6b131934095850ba2ca7544a06ce09f1caa7b52224e54290ab662978c9fbdca7d3e8fc04094e30017

    • SSDEEP

      3072:rteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzm9qM:jq7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks