General

  • Target

    JaffaCakes118_bb7d22c3a7dbc8ad9fe561f83c866911d38cf56ca2502c3ce39194ff50a32aa5

  • Size

    188KB

  • Sample

    241230-e5771syjf1

  • MD5

    0fed011e63d176c47a9e0746af9444ef

  • SHA1

    a8d24c979ca149af44f592ffa48f988734f26064

  • SHA256

    bb7d22c3a7dbc8ad9fe561f83c866911d38cf56ca2502c3ce39194ff50a32aa5

  • SHA512

    9288e38f38a86a2b54eedb0beb6e30f7d5fa1a45e6e3bb9d24edd61c1408f9687b25b1790f30753572f827fe296fa39dc6f4b29a5ba0c2091ca07265a53a3a3f

  • SSDEEP

    3072:vteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzY9qM:3q7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_bb7d22c3a7dbc8ad9fe561f83c866911d38cf56ca2502c3ce39194ff50a32aa5

    • Size

      188KB

    • MD5

      0fed011e63d176c47a9e0746af9444ef

    • SHA1

      a8d24c979ca149af44f592ffa48f988734f26064

    • SHA256

      bb7d22c3a7dbc8ad9fe561f83c866911d38cf56ca2502c3ce39194ff50a32aa5

    • SHA512

      9288e38f38a86a2b54eedb0beb6e30f7d5fa1a45e6e3bb9d24edd61c1408f9687b25b1790f30753572f827fe296fa39dc6f4b29a5ba0c2091ca07265a53a3a3f

    • SSDEEP

      3072:vteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzY9qM:3q7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks