General

  • Target

    JaffaCakes118_27da37257500bc68231b5ac6a2bf2d90a5f686d54ed8c12b87478062efec647a

  • Size

    188KB

  • Sample

    241230-e5h8wsyjhq

  • MD5

    f74323ff17d813801d84481fde6e053d

  • SHA1

    34d2c58de387d27e07b6d4c80df64f3d45e71fbb

  • SHA256

    27da37257500bc68231b5ac6a2bf2d90a5f686d54ed8c12b87478062efec647a

  • SHA512

    f9d277f6773d47393b0aa311747196ed7250fd0bb67068853ea7a60319dd19efd62106b04d3dc0e5e5e5afd015f27f067031478f7bdce368fe8e07536674235d

  • SSDEEP

    3072:DteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIz49qM:rq7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_27da37257500bc68231b5ac6a2bf2d90a5f686d54ed8c12b87478062efec647a

    • Size

      188KB

    • MD5

      f74323ff17d813801d84481fde6e053d

    • SHA1

      34d2c58de387d27e07b6d4c80df64f3d45e71fbb

    • SHA256

      27da37257500bc68231b5ac6a2bf2d90a5f686d54ed8c12b87478062efec647a

    • SHA512

      f9d277f6773d47393b0aa311747196ed7250fd0bb67068853ea7a60319dd19efd62106b04d3dc0e5e5e5afd015f27f067031478f7bdce368fe8e07536674235d

    • SSDEEP

      3072:DteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIz49qM:rq7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks