General

  • Target

    JaffaCakes118_75287cec1f637d981702b23914a1b47ac7b64d94d3c3ea950912cbc36f1105d0

  • Size

    188KB

  • Sample

    241230-3ymvhaxpfx

  • MD5

    ce01d758b7719a7a4203adfdef65a34b

  • SHA1

    aea6566dd124c7f23ddc53e5cb0ee309a72e9dc8

  • SHA256

    75287cec1f637d981702b23914a1b47ac7b64d94d3c3ea950912cbc36f1105d0

  • SHA512

    2c5e8b619477734a7359655b69dcfe52cedefdefdde3b02cf95ed8243048a3cc7c73ac8e7a7895d351ebc527d9a5deaeadc7f95007baefe8e20aeb83d07d4e6e

  • SSDEEP

    3072:cteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzL9qM:gq7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_75287cec1f637d981702b23914a1b47ac7b64d94d3c3ea950912cbc36f1105d0

    • Size

      188KB

    • MD5

      ce01d758b7719a7a4203adfdef65a34b

    • SHA1

      aea6566dd124c7f23ddc53e5cb0ee309a72e9dc8

    • SHA256

      75287cec1f637d981702b23914a1b47ac7b64d94d3c3ea950912cbc36f1105d0

    • SHA512

      2c5e8b619477734a7359655b69dcfe52cedefdefdde3b02cf95ed8243048a3cc7c73ac8e7a7895d351ebc527d9a5deaeadc7f95007baefe8e20aeb83d07d4e6e

    • SSDEEP

      3072:cteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzL9qM:gq7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks