General

  • Target

    JaffaCakes118_1a134a9a881cb9f244d33ab10486258e7d79522f1b861cadc3e532f7385d46dd

  • Size

    188KB

  • Sample

    241230-3jrj5swrcz

  • MD5

    ba6aa548ce8662ae2cccc7f048b4684a

  • SHA1

    3ea85261dd52c2466ef947d2371f181ae5445f84

  • SHA256

    1a134a9a881cb9f244d33ab10486258e7d79522f1b861cadc3e532f7385d46dd

  • SHA512

    ef720eb3fadf7c452d05668645b9a01065d473e184950a0832258f9220e559a905aa2a0be9a37bd7e4e8cc05b71a72cd48a19db19d4934cebdd70aab69629484

  • SSDEEP

    3072:2teMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIz39qM:+q7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_1a134a9a881cb9f244d33ab10486258e7d79522f1b861cadc3e532f7385d46dd

    • Size

      188KB

    • MD5

      ba6aa548ce8662ae2cccc7f048b4684a

    • SHA1

      3ea85261dd52c2466ef947d2371f181ae5445f84

    • SHA256

      1a134a9a881cb9f244d33ab10486258e7d79522f1b861cadc3e532f7385d46dd

    • SHA512

      ef720eb3fadf7c452d05668645b9a01065d473e184950a0832258f9220e559a905aa2a0be9a37bd7e4e8cc05b71a72cd48a19db19d4934cebdd70aab69629484

    • SSDEEP

      3072:2teMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIz39qM:+q7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks