General

  • Target

    JaffaCakes118_1b8993fe663ce6414adab3e2bfdc649bb3a731b62cfc43df9c74eaae3edcfd61

  • Size

    188KB

  • Sample

    241230-f3lfxayrev

  • MD5

    a3f39b42ae8f296eb0b1ea7707c2ee9e

  • SHA1

    e528ff8f9c63184e3cb5b7f41d6590129e7f6194

  • SHA256

    1b8993fe663ce6414adab3e2bfdc649bb3a731b62cfc43df9c74eaae3edcfd61

  • SHA512

    6d6ea1e533270bd4b784e8c0b4dd44163a11e33a18c7222a8688f0b240e546a9f859a9b38a543dd286c307f90fcd7ad5c63bfdf3e10b37e265868bd9170a85ab

  • SSDEEP

    3072:YteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzY9qM:cq7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_1b8993fe663ce6414adab3e2bfdc649bb3a731b62cfc43df9c74eaae3edcfd61

    • Size

      188KB

    • MD5

      a3f39b42ae8f296eb0b1ea7707c2ee9e

    • SHA1

      e528ff8f9c63184e3cb5b7f41d6590129e7f6194

    • SHA256

      1b8993fe663ce6414adab3e2bfdc649bb3a731b62cfc43df9c74eaae3edcfd61

    • SHA512

      6d6ea1e533270bd4b784e8c0b4dd44163a11e33a18c7222a8688f0b240e546a9f859a9b38a543dd286c307f90fcd7ad5c63bfdf3e10b37e265868bd9170a85ab

    • SSDEEP

      3072:YteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzY9qM:cq7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks