General

  • Target

    JaffaCakes118_1306730f81d865b4de2c3524cf10dca44bd07eceb461a46b340be5bfac1e3e15

  • Size

    188KB

  • Sample

    241230-gntpeazqby

  • MD5

    d9f24abd60f524ab0ff8402c89206e4b

  • SHA1

    a32df5cade8b8c39d36c03ef968c4de1858d0614

  • SHA256

    1306730f81d865b4de2c3524cf10dca44bd07eceb461a46b340be5bfac1e3e15

  • SHA512

    153798fd3cb8c66ffd7cc1fe5488a81f5c3a250a17e23205e3c99c5ec5a12b9280f9f39b4405292d2c93a9b7e6036f7c900b15586d19c643bccae7a8d7225dd4

  • SSDEEP

    3072:JteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzp9qM:Fq7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_1306730f81d865b4de2c3524cf10dca44bd07eceb461a46b340be5bfac1e3e15

    • Size

      188KB

    • MD5

      d9f24abd60f524ab0ff8402c89206e4b

    • SHA1

      a32df5cade8b8c39d36c03ef968c4de1858d0614

    • SHA256

      1306730f81d865b4de2c3524cf10dca44bd07eceb461a46b340be5bfac1e3e15

    • SHA512

      153798fd3cb8c66ffd7cc1fe5488a81f5c3a250a17e23205e3c99c5ec5a12b9280f9f39b4405292d2c93a9b7e6036f7c900b15586d19c643bccae7a8d7225dd4

    • SSDEEP

      3072:JteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzp9qM:Fq7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks