General

  • Target

    JaffaCakes118_946c5c164a71d0fb8917b4c869a1e22967a97c1482de3f33750b8afa9ea9ff4c

  • Size

    188KB

  • Sample

    241230-v6evvstncw

  • MD5

    15dbaf352a9a9e2cdf9a7c2d5ef93b07

  • SHA1

    8e563165051fb7063df02ea1d78c0120bbb4d5d2

  • SHA256

    946c5c164a71d0fb8917b4c869a1e22967a97c1482de3f33750b8afa9ea9ff4c

  • SHA512

    06453a6415c8c5d58293423f7ef54964fefc01726fc335cf87784be0f07da2890a0e260c6e7e42329e98e99605d4ff64fecb1c27be65bd88fb5961a9169db638

  • SSDEEP

    3072:NteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIz69qM:5q7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_946c5c164a71d0fb8917b4c869a1e22967a97c1482de3f33750b8afa9ea9ff4c

    • Size

      188KB

    • MD5

      15dbaf352a9a9e2cdf9a7c2d5ef93b07

    • SHA1

      8e563165051fb7063df02ea1d78c0120bbb4d5d2

    • SHA256

      946c5c164a71d0fb8917b4c869a1e22967a97c1482de3f33750b8afa9ea9ff4c

    • SHA512

      06453a6415c8c5d58293423f7ef54964fefc01726fc335cf87784be0f07da2890a0e260c6e7e42329e98e99605d4ff64fecb1c27be65bd88fb5961a9169db638

    • SSDEEP

      3072:NteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIz69qM:5q7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks