General

  • Target

    JaffaCakes118_c7d8825d123d2b6f753b58c2f938a7ae26b51b8f044d623554c924ff3ecfc577

  • Size

    188KB

  • Sample

    241230-eyk4xaxrbr

  • MD5

    c2d8bbdc06bffa9d9e77ac9c2151e372

  • SHA1

    4888c3d14e967dbd1e2f20825592e705783c3e0d

  • SHA256

    c7d8825d123d2b6f753b58c2f938a7ae26b51b8f044d623554c924ff3ecfc577

  • SHA512

    4f10e1da29bd2417a82deabcb2dae6aa3da81adfa1a62d8a86941c7f20679c8d7b9696c0caa4a551e648ce9edadd9b8fe4a432aba9ab2c45b36f6ca24a730d42

  • SSDEEP

    3072:qteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzj9qM:Cq7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_c7d8825d123d2b6f753b58c2f938a7ae26b51b8f044d623554c924ff3ecfc577

    • Size

      188KB

    • MD5

      c2d8bbdc06bffa9d9e77ac9c2151e372

    • SHA1

      4888c3d14e967dbd1e2f20825592e705783c3e0d

    • SHA256

      c7d8825d123d2b6f753b58c2f938a7ae26b51b8f044d623554c924ff3ecfc577

    • SHA512

      4f10e1da29bd2417a82deabcb2dae6aa3da81adfa1a62d8a86941c7f20679c8d7b9696c0caa4a551e648ce9edadd9b8fe4a432aba9ab2c45b36f6ca24a730d42

    • SSDEEP

      3072:qteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzj9qM:Cq7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks