General

  • Target

    JaffaCakes118_1759ac6e0f737218b6ee32a566c975fcd58744a29e9ea1ed5aaf0448657b43a7

  • Size

    188KB

  • Sample

    241230-2pacdavncy

  • MD5

    11d70a0aa9930f8374217ecd33d76815

  • SHA1

    343575a6fd30512b6519e08e39817367982228f6

  • SHA256

    1759ac6e0f737218b6ee32a566c975fcd58744a29e9ea1ed5aaf0448657b43a7

  • SHA512

    26c258e8e85e21cef794d3798209ad846592ee6ea9f7809deefacb758936105a0fc65bbb7c9e0fd66a3d6ccf915810939ed4d0e8dccb1d0fdc57ce84a00faa52

  • SSDEEP

    3072:mteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzo9qM:Oq7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_1759ac6e0f737218b6ee32a566c975fcd58744a29e9ea1ed5aaf0448657b43a7

    • Size

      188KB

    • MD5

      11d70a0aa9930f8374217ecd33d76815

    • SHA1

      343575a6fd30512b6519e08e39817367982228f6

    • SHA256

      1759ac6e0f737218b6ee32a566c975fcd58744a29e9ea1ed5aaf0448657b43a7

    • SHA512

      26c258e8e85e21cef794d3798209ad846592ee6ea9f7809deefacb758936105a0fc65bbb7c9e0fd66a3d6ccf915810939ed4d0e8dccb1d0fdc57ce84a00faa52

    • SSDEEP

      3072:mteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzo9qM:Oq7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks