General

  • Target

    JaffaCakes118_4a4c72972e394c3f57ed6fac2b998f4345d6555b94f20798e3271190d9892de5

  • Size

    188KB

  • Sample

    241230-e3zsvsyjep

  • MD5

    b53f2eda9aa41bfab821fae00362f372

  • SHA1

    076cf89ae2471f204d57e4008460b19055f04062

  • SHA256

    4a4c72972e394c3f57ed6fac2b998f4345d6555b94f20798e3271190d9892de5

  • SHA512

    c68a9f0018192bc28bc1c09143670cff6ab67aa970092028972e8bfcfdca3f32617edeeb139773bdbcea5187565903507739613c8d64116b391e3901d60a2d68

  • SSDEEP

    3072:KteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzv9qM:iq7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_4a4c72972e394c3f57ed6fac2b998f4345d6555b94f20798e3271190d9892de5

    • Size

      188KB

    • MD5

      b53f2eda9aa41bfab821fae00362f372

    • SHA1

      076cf89ae2471f204d57e4008460b19055f04062

    • SHA256

      4a4c72972e394c3f57ed6fac2b998f4345d6555b94f20798e3271190d9892de5

    • SHA512

      c68a9f0018192bc28bc1c09143670cff6ab67aa970092028972e8bfcfdca3f32617edeeb139773bdbcea5187565903507739613c8d64116b391e3901d60a2d68

    • SSDEEP

      3072:KteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzv9qM:iq7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks