General

  • Target

    JaffaCakes118_2dc37eba41d85da8d8c795a350b84b7c3278dc6edbfbb3e0ea299f0c5462b120

  • Size

    188KB

  • Sample

    241230-e11blsyjal

  • MD5

    0ff5fbbd9516890c7b718f6c214a225b

  • SHA1

    23de5d6077a45e9791887bd2a890ce33c500c890

  • SHA256

    2dc37eba41d85da8d8c795a350b84b7c3278dc6edbfbb3e0ea299f0c5462b120

  • SHA512

    518367e72ad60d44c778c8f256939e08b9016dc43767ba86002e154236868009462e6265a751a8ad0affc5dd49f8a4d2a8031f9bffb367f48c7dc5cba54d5085

  • SSDEEP

    3072:OteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIz19qM:mq7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_2dc37eba41d85da8d8c795a350b84b7c3278dc6edbfbb3e0ea299f0c5462b120

    • Size

      188KB

    • MD5

      0ff5fbbd9516890c7b718f6c214a225b

    • SHA1

      23de5d6077a45e9791887bd2a890ce33c500c890

    • SHA256

      2dc37eba41d85da8d8c795a350b84b7c3278dc6edbfbb3e0ea299f0c5462b120

    • SHA512

      518367e72ad60d44c778c8f256939e08b9016dc43767ba86002e154236868009462e6265a751a8ad0affc5dd49f8a4d2a8031f9bffb367f48c7dc5cba54d5085

    • SSDEEP

      3072:OteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIz19qM:mq7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks