General

  • Target

    JaffaCakes118_18c3ad3e2c244b7f4f0398831f54fc5a66b9a27f2209dc63c6dc163b103b6048

  • Size

    188KB

  • Sample

    241230-ha6bqa1kdp

  • MD5

    f9025e50d953cf5ff923f1a5281cdb51

  • SHA1

    7a092728b09f916294880e8eeea5815724fce0a5

  • SHA256

    18c3ad3e2c244b7f4f0398831f54fc5a66b9a27f2209dc63c6dc163b103b6048

  • SHA512

    5078fb467dd9ec3f196e9ec59d5cbeacb7288d4d6578cd8019dd305ec7ff990d6aeaf9d85e284a693fa85665e4ce27364014857602b3e152207a245269fb249b

  • SSDEEP

    3072:5teMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzJ9qM:Vq7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_18c3ad3e2c244b7f4f0398831f54fc5a66b9a27f2209dc63c6dc163b103b6048

    • Size

      188KB

    • MD5

      f9025e50d953cf5ff923f1a5281cdb51

    • SHA1

      7a092728b09f916294880e8eeea5815724fce0a5

    • SHA256

      18c3ad3e2c244b7f4f0398831f54fc5a66b9a27f2209dc63c6dc163b103b6048

    • SHA512

      5078fb467dd9ec3f196e9ec59d5cbeacb7288d4d6578cd8019dd305ec7ff990d6aeaf9d85e284a693fa85665e4ce27364014857602b3e152207a245269fb249b

    • SSDEEP

      3072:5teMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzJ9qM:Vq7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks