General

  • Target

    JaffaCakes118_c33a3152434c5b61a98032108e4441a1ad075a4554c9b26728ffcc6302208ba9

  • Size

    188KB

  • Sample

    241230-x84m4sxpfw

  • MD5

    4350c9c5e3a17c52090691bb705047cd

  • SHA1

    3da94d9c694d882bd38a43efdd66ceaa0aa198eb

  • SHA256

    c33a3152434c5b61a98032108e4441a1ad075a4554c9b26728ffcc6302208ba9

  • SHA512

    d93ba403a15ad551c0b00533a0520e37a5fec706693c671723a7a1b14f752011856e80307765259c7f4a0ba0dc44412bfdcdb62174c93b97ec5fe44427f021d7

  • SSDEEP

    3072:eteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIz99qM:Wq7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_c33a3152434c5b61a98032108e4441a1ad075a4554c9b26728ffcc6302208ba9

    • Size

      188KB

    • MD5

      4350c9c5e3a17c52090691bb705047cd

    • SHA1

      3da94d9c694d882bd38a43efdd66ceaa0aa198eb

    • SHA256

      c33a3152434c5b61a98032108e4441a1ad075a4554c9b26728ffcc6302208ba9

    • SHA512

      d93ba403a15ad551c0b00533a0520e37a5fec706693c671723a7a1b14f752011856e80307765259c7f4a0ba0dc44412bfdcdb62174c93b97ec5fe44427f021d7

    • SSDEEP

      3072:eteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIz99qM:Wq7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks