General

  • Target

    JaffaCakes118_b65cf21927a5e802b6b7c8bf3d846e6d85f096fd83168c8baef638edde2c00ec

  • Size

    188KB

  • Sample

    241230-3xxcjsvmdm

  • MD5

    ad8462d8fde711d7c1010c428e0f4727

  • SHA1

    7d6a3e7296606363a0c271ea4c11b72b547a16ee

  • SHA256

    b65cf21927a5e802b6b7c8bf3d846e6d85f096fd83168c8baef638edde2c00ec

  • SHA512

    458e7580f233e1f5deac7d0b5c2fc026898ef14369d852b25b8b2d0e2208096fbc26d822262f8c5519dfa0914a5569648fde485feb3ba69afb6108dfa935544a

  • SSDEEP

    3072:lteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIz29qM:hq7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_b65cf21927a5e802b6b7c8bf3d846e6d85f096fd83168c8baef638edde2c00ec

    • Size

      188KB

    • MD5

      ad8462d8fde711d7c1010c428e0f4727

    • SHA1

      7d6a3e7296606363a0c271ea4c11b72b547a16ee

    • SHA256

      b65cf21927a5e802b6b7c8bf3d846e6d85f096fd83168c8baef638edde2c00ec

    • SHA512

      458e7580f233e1f5deac7d0b5c2fc026898ef14369d852b25b8b2d0e2208096fbc26d822262f8c5519dfa0914a5569648fde485feb3ba69afb6108dfa935544a

    • SSDEEP

      3072:lteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIz29qM:hq7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks