General

  • Target

    JaffaCakes118_a710f2f29ba259ad158eaa3ffba024f0af83f005bb28fe4aea0ee35d8eca7543

  • Size

    188KB

  • Sample

    241230-3b21xatldk

  • MD5

    b82a3b88f71a6d223cf0cd1cd6b53a15

  • SHA1

    7bd0fb528195ee38809241596843bbbf89f1141c

  • SHA256

    a710f2f29ba259ad158eaa3ffba024f0af83f005bb28fe4aea0ee35d8eca7543

  • SHA512

    463094df866e6b59872a27322deda5091da91550a095e7a2af437d8cdda46d2f49767646979b390c0f529edc93d470a0640b99c6862143978366ce5a63fc17cf

  • SSDEEP

    3072:hteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIz79qM:tq7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_a710f2f29ba259ad158eaa3ffba024f0af83f005bb28fe4aea0ee35d8eca7543

    • Size

      188KB

    • MD5

      b82a3b88f71a6d223cf0cd1cd6b53a15

    • SHA1

      7bd0fb528195ee38809241596843bbbf89f1141c

    • SHA256

      a710f2f29ba259ad158eaa3ffba024f0af83f005bb28fe4aea0ee35d8eca7543

    • SHA512

      463094df866e6b59872a27322deda5091da91550a095e7a2af437d8cdda46d2f49767646979b390c0f529edc93d470a0640b99c6862143978366ce5a63fc17cf

    • SSDEEP

      3072:hteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIz79qM:tq7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks