General

  • Target

    JaffaCakes118_f23845eb6114076fc54ab215f5ab44aab8ed75cad83c7c05271d0ee9c4180fdd

  • Size

    188KB

  • Sample

    241230-gafkmazmcr

  • MD5

    ca6a791af3a1e728fab9d95c037afde5

  • SHA1

    a51146c6b91e6bdba96d1c70f29fa6715a44dace

  • SHA256

    f23845eb6114076fc54ab215f5ab44aab8ed75cad83c7c05271d0ee9c4180fdd

  • SHA512

    a7715cc7a1733d78975e484d9bb80939cf22b7690ca1a4427a53e9f86752769433b85cbc332d9f474d8f2fc229ad713cb91524213bdf7b8defcdfdf49880e56a

  • SSDEEP

    3072:/teMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIz99qM:nq7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_f23845eb6114076fc54ab215f5ab44aab8ed75cad83c7c05271d0ee9c4180fdd

    • Size

      188KB

    • MD5

      ca6a791af3a1e728fab9d95c037afde5

    • SHA1

      a51146c6b91e6bdba96d1c70f29fa6715a44dace

    • SHA256

      f23845eb6114076fc54ab215f5ab44aab8ed75cad83c7c05271d0ee9c4180fdd

    • SHA512

      a7715cc7a1733d78975e484d9bb80939cf22b7690ca1a4427a53e9f86752769433b85cbc332d9f474d8f2fc229ad713cb91524213bdf7b8defcdfdf49880e56a

    • SSDEEP

      3072:/teMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIz99qM:nq7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks