General

  • Target

    JaffaCakes118_72489fb4364ca4f240398f506c6fc2b3dc1c01c6582368c523267f445fc013fc

  • Size

    188KB

  • Sample

    241230-fwwnasyral

  • MD5

    7ff1031fcc53e1568869defa99c035da

  • SHA1

    e42f36dbe6ded22dba01f0aac8a3d129a6d38f63

  • SHA256

    72489fb4364ca4f240398f506c6fc2b3dc1c01c6582368c523267f445fc013fc

  • SHA512

    43cc54ee56794c8dc77e43d2bb153802633d535c5bda6a4732f1e735e80f18ef7d1014e039d6ba6e8262447fdd842513aa6afaa4aa79a60036c3435805c371d3

  • SSDEEP

    3072:1teMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzf9qM:Rq7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_72489fb4364ca4f240398f506c6fc2b3dc1c01c6582368c523267f445fc013fc

    • Size

      188KB

    • MD5

      7ff1031fcc53e1568869defa99c035da

    • SHA1

      e42f36dbe6ded22dba01f0aac8a3d129a6d38f63

    • SHA256

      72489fb4364ca4f240398f506c6fc2b3dc1c01c6582368c523267f445fc013fc

    • SHA512

      43cc54ee56794c8dc77e43d2bb153802633d535c5bda6a4732f1e735e80f18ef7d1014e039d6ba6e8262447fdd842513aa6afaa4aa79a60036c3435805c371d3

    • SSDEEP

      3072:1teMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzf9qM:Rq7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks