General

  • Target

    JaffaCakes118_3b3c7fa145a680df37c41129e7fa491cd40bdb7787dd71dd2f910d66b1e27492

  • Size

    188KB

  • Sample

    241230-gyjl7azrel

  • MD5

    55cf9b6b97fba14340dd8a872118b82e

  • SHA1

    919353efb88ebbd746c267a59df89bf9c22ee46e

  • SHA256

    3b3c7fa145a680df37c41129e7fa491cd40bdb7787dd71dd2f910d66b1e27492

  • SHA512

    716071b1fd814b0e105dc044f4f6ede77071b0029d33ae2aa7baa120e9fc872c89025b406d00bd8a55a9b7bd9c9416e571c3afae5347e0791a35fc8b5a7bb94d

  • SSDEEP

    3072:HteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIz29qM:fq7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_3b3c7fa145a680df37c41129e7fa491cd40bdb7787dd71dd2f910d66b1e27492

    • Size

      188KB

    • MD5

      55cf9b6b97fba14340dd8a872118b82e

    • SHA1

      919353efb88ebbd746c267a59df89bf9c22ee46e

    • SHA256

      3b3c7fa145a680df37c41129e7fa491cd40bdb7787dd71dd2f910d66b1e27492

    • SHA512

      716071b1fd814b0e105dc044f4f6ede77071b0029d33ae2aa7baa120e9fc872c89025b406d00bd8a55a9b7bd9c9416e571c3afae5347e0791a35fc8b5a7bb94d

    • SSDEEP

      3072:HteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIz29qM:fq7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks