General

  • Target

    JaffaCakes118_79055d084016da6f37a5ad686cf325fdee4f38dfcf4cf355e99cf5b1732d1698

  • Size

    188KB

  • Sample

    241230-v4b17atmcz

  • MD5

    18c7285d165129637d6313673215d3cb

  • SHA1

    d055e87b9ed9f368c4f863976d9d37a4e6deb15f

  • SHA256

    79055d084016da6f37a5ad686cf325fdee4f38dfcf4cf355e99cf5b1732d1698

  • SHA512

    0279f0c46277078fd01afb88020c7226e977f899e1e4f4519f67ca080fb6ef4f387b7bb0b997506fac9933624e7a9f01cd95f2d10e2b56f727cd935355ed5648

  • SSDEEP

    3072:nteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzd9qM:/q7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_79055d084016da6f37a5ad686cf325fdee4f38dfcf4cf355e99cf5b1732d1698

    • Size

      188KB

    • MD5

      18c7285d165129637d6313673215d3cb

    • SHA1

      d055e87b9ed9f368c4f863976d9d37a4e6deb15f

    • SHA256

      79055d084016da6f37a5ad686cf325fdee4f38dfcf4cf355e99cf5b1732d1698

    • SHA512

      0279f0c46277078fd01afb88020c7226e977f899e1e4f4519f67ca080fb6ef4f387b7bb0b997506fac9933624e7a9f01cd95f2d10e2b56f727cd935355ed5648

    • SSDEEP

      3072:nteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzd9qM:/q7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks