General

  • Target

    JaffaCakes118_c75b1cecf7de0ce1466ec6c7a2966b92786d87c30ca5464ba6b7aeba17f9901d

  • Size

    188KB

  • Sample

    241230-fq43gsyqbm

  • MD5

    04a836ff698174dceb2877616c7f108a

  • SHA1

    a9540151915d82776a5022e0deffa69565226ee9

  • SHA256

    c75b1cecf7de0ce1466ec6c7a2966b92786d87c30ca5464ba6b7aeba17f9901d

  • SHA512

    d9481b740f149f44a48df7a23ac810b4862282fc9ceb5708429146b11c2fc3fb1a93aa609c64db70e6a3ac7f646e2ca3edf94b8f7f834115c699b3d7583a6700

  • SSDEEP

    3072:tteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzU9qM:Zq7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_c75b1cecf7de0ce1466ec6c7a2966b92786d87c30ca5464ba6b7aeba17f9901d

    • Size

      188KB

    • MD5

      04a836ff698174dceb2877616c7f108a

    • SHA1

      a9540151915d82776a5022e0deffa69565226ee9

    • SHA256

      c75b1cecf7de0ce1466ec6c7a2966b92786d87c30ca5464ba6b7aeba17f9901d

    • SHA512

      d9481b740f149f44a48df7a23ac810b4862282fc9ceb5708429146b11c2fc3fb1a93aa609c64db70e6a3ac7f646e2ca3edf94b8f7f834115c699b3d7583a6700

    • SSDEEP

      3072:tteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzU9qM:Zq7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks