General

  • Target

    JaffaCakes118_68262307e8bcb2fadf47ec97b706784c301616f55030bc99d70ada205095d571

  • Size

    188KB

  • Sample

    241230-vt2tvstje1

  • MD5

    68e767799128716dcbaeba456cc1bce4

  • SHA1

    6d0d4aa4afb0db19dee0c586228ef7e6ff98145e

  • SHA256

    68262307e8bcb2fadf47ec97b706784c301616f55030bc99d70ada205095d571

  • SHA512

    4d91d32b59c48e289e8b212e18e3411347cdc8f9d7b4d284ef46ac4d7c12b37f619f666e5d09559b7dbbcfca31a7bd44a0dd3a2ce4bdc7f960094e227ae94d38

  • SSDEEP

    3072:cteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIz29qM:gq7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_68262307e8bcb2fadf47ec97b706784c301616f55030bc99d70ada205095d571

    • Size

      188KB

    • MD5

      68e767799128716dcbaeba456cc1bce4

    • SHA1

      6d0d4aa4afb0db19dee0c586228ef7e6ff98145e

    • SHA256

      68262307e8bcb2fadf47ec97b706784c301616f55030bc99d70ada205095d571

    • SHA512

      4d91d32b59c48e289e8b212e18e3411347cdc8f9d7b4d284ef46ac4d7c12b37f619f666e5d09559b7dbbcfca31a7bd44a0dd3a2ce4bdc7f960094e227ae94d38

    • SSDEEP

      3072:cteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIz29qM:gq7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks