General

  • Target

    JaffaCakes118_63304e51aa3709b082430a1b626a0e5261103a42b13fc12ea839673d6e6cc954

  • Size

    188KB

  • Sample

    241230-fqfd5aypes

  • MD5

    e51793f9b71fc6eb6e30d3316d5c0c1e

  • SHA1

    4e860a5b46b5620bb95c0f4d887b34921d9ae436

  • SHA256

    63304e51aa3709b082430a1b626a0e5261103a42b13fc12ea839673d6e6cc954

  • SHA512

    38fa3c147fd5079108e3cb0c26100a5df23c20eb1c61fedbd682fb746e201ae0e6d7669d69ddc7f0e87d9f3805d0a3cb0185f7c70ed60572dd5a0adab7cc1501

  • SSDEEP

    3072:kteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzq9qM:Yq7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_63304e51aa3709b082430a1b626a0e5261103a42b13fc12ea839673d6e6cc954

    • Size

      188KB

    • MD5

      e51793f9b71fc6eb6e30d3316d5c0c1e

    • SHA1

      4e860a5b46b5620bb95c0f4d887b34921d9ae436

    • SHA256

      63304e51aa3709b082430a1b626a0e5261103a42b13fc12ea839673d6e6cc954

    • SHA512

      38fa3c147fd5079108e3cb0c26100a5df23c20eb1c61fedbd682fb746e201ae0e6d7669d69ddc7f0e87d9f3805d0a3cb0185f7c70ed60572dd5a0adab7cc1501

    • SSDEEP

      3072:kteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzq9qM:Yq7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks