General

  • Target

    JaffaCakes118_1955d54bf14c99ea4f3d2bdd203ce1e64cc6e5da4c2d449dc2b95220134af576

  • Size

    188KB

  • Sample

    241230-wxlsgssnak

  • MD5

    467956312664ed1272ec4013dfcb7cb1

  • SHA1

    d3f897df52d702f3a96d717b4f59968ab315cc79

  • SHA256

    1955d54bf14c99ea4f3d2bdd203ce1e64cc6e5da4c2d449dc2b95220134af576

  • SHA512

    52cdf65d3a27465cf795b9f21be3c8a41b2343aa229d4cc8f76dcefa8fa74bb201c29fca67b30b0f1215542e9b3dbfcdcf7c110cf5843e4e38397ca4dbc17eaa

  • SSDEEP

    3072:0teMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzG9qM:Iq7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_1955d54bf14c99ea4f3d2bdd203ce1e64cc6e5da4c2d449dc2b95220134af576

    • Size

      188KB

    • MD5

      467956312664ed1272ec4013dfcb7cb1

    • SHA1

      d3f897df52d702f3a96d717b4f59968ab315cc79

    • SHA256

      1955d54bf14c99ea4f3d2bdd203ce1e64cc6e5da4c2d449dc2b95220134af576

    • SHA512

      52cdf65d3a27465cf795b9f21be3c8a41b2343aa229d4cc8f76dcefa8fa74bb201c29fca67b30b0f1215542e9b3dbfcdcf7c110cf5843e4e38397ca4dbc17eaa

    • SSDEEP

      3072:0teMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzG9qM:Iq7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks