General

  • Target

    JaffaCakes118_8fc3430688a5d8d3cb30a55937dd2d754fac1bb51ac824f94628508d032b20e9

  • Size

    188KB

  • Sample

    241230-eqxgzaxpdq

  • MD5

    b30f613fccc1e7374fa4631499764aa1

  • SHA1

    b4e7381e5bd5e4e8a97d2c16aeef01b658b3a472

  • SHA256

    8fc3430688a5d8d3cb30a55937dd2d754fac1bb51ac824f94628508d032b20e9

  • SHA512

    90ee714ecef5b25efcac4b76e1c2f66f759fea3e9d6bd5906c795e90c635f80ae590016c59cc773a133b2240a92b301ace25afb14c0a1606653a59b651b609d5

  • SSDEEP

    3072:oteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzX9qM:Mq7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_8fc3430688a5d8d3cb30a55937dd2d754fac1bb51ac824f94628508d032b20e9

    • Size

      188KB

    • MD5

      b30f613fccc1e7374fa4631499764aa1

    • SHA1

      b4e7381e5bd5e4e8a97d2c16aeef01b658b3a472

    • SHA256

      8fc3430688a5d8d3cb30a55937dd2d754fac1bb51ac824f94628508d032b20e9

    • SHA512

      90ee714ecef5b25efcac4b76e1c2f66f759fea3e9d6bd5906c795e90c635f80ae590016c59cc773a133b2240a92b301ace25afb14c0a1606653a59b651b609d5

    • SSDEEP

      3072:oteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzX9qM:Mq7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks