General

  • Target

    JaffaCakes118_b9cd4bb1104934d53d0e6e6acd1fcaa060b9542be6f02f4f205c46a3ecbddf55

  • Size

    188KB

  • Sample

    241230-xa39pawkct

  • MD5

    6c83af19a0941b936b098fa04b6e78b5

  • SHA1

    092386cb9a981c722b8d85a149dea705355dcdb8

  • SHA256

    b9cd4bb1104934d53d0e6e6acd1fcaa060b9542be6f02f4f205c46a3ecbddf55

  • SHA512

    3a83122cdc86a436e4a4c03d9e5bbd0c101451d0e750d4b8b03ff461e2fed3876730423fc6b3b68785ab06e958466d5be062239fdc1e8e9cb2ab17d575d96e87

  • SSDEEP

    3072:EteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzI9qM:4q7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_b9cd4bb1104934d53d0e6e6acd1fcaa060b9542be6f02f4f205c46a3ecbddf55

    • Size

      188KB

    • MD5

      6c83af19a0941b936b098fa04b6e78b5

    • SHA1

      092386cb9a981c722b8d85a149dea705355dcdb8

    • SHA256

      b9cd4bb1104934d53d0e6e6acd1fcaa060b9542be6f02f4f205c46a3ecbddf55

    • SHA512

      3a83122cdc86a436e4a4c03d9e5bbd0c101451d0e750d4b8b03ff461e2fed3876730423fc6b3b68785ab06e958466d5be062239fdc1e8e9cb2ab17d575d96e87

    • SSDEEP

      3072:EteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzI9qM:4q7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks