General

  • Target

    JaffaCakes118_6d4e3d15bda99d6d93c9f5abd0ba529a3895047de4de78f7956fd84ed8a5034a

  • Size

    188KB

  • Sample

    241230-wj5y7ssjfm

  • MD5

    5c10ce86249aa9b7df299ea71f4660a0

  • SHA1

    fb9acaa3fd478ac8819f8267bd5537f90857b8ef

  • SHA256

    6d4e3d15bda99d6d93c9f5abd0ba529a3895047de4de78f7956fd84ed8a5034a

  • SHA512

    33c2e5e46432715bd959cd73ca51abd96ef9ce191006b185c1c15e2e15e86b6c1c8c0cbbeff76f38e8b57af712dd5f9ddf175d235037eda5f78f4350d4772638

  • SSDEEP

    3072:CteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIz/9qM:qq7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_6d4e3d15bda99d6d93c9f5abd0ba529a3895047de4de78f7956fd84ed8a5034a

    • Size

      188KB

    • MD5

      5c10ce86249aa9b7df299ea71f4660a0

    • SHA1

      fb9acaa3fd478ac8819f8267bd5537f90857b8ef

    • SHA256

      6d4e3d15bda99d6d93c9f5abd0ba529a3895047de4de78f7956fd84ed8a5034a

    • SHA512

      33c2e5e46432715bd959cd73ca51abd96ef9ce191006b185c1c15e2e15e86b6c1c8c0cbbeff76f38e8b57af712dd5f9ddf175d235037eda5f78f4350d4772638

    • SSDEEP

      3072:CteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIz/9qM:qq7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks