General

  • Target

    JaffaCakes118_e1fb5b416ee72e6d152fd0bdfc058ec9bc868b8b7acac95972522485066121ac

  • Size

    188KB

  • Sample

    241230-xptzkawqbw

  • MD5

    5eadb97e9d3dbcb92d18660699bcc851

  • SHA1

    4fbe790c556af06b25cb8c514517c1eb81eba72a

  • SHA256

    e1fb5b416ee72e6d152fd0bdfc058ec9bc868b8b7acac95972522485066121ac

  • SHA512

    a4592bf90c4f52b33a193b63dac1224c4eebec65f562413fd6af40bb5b7660556cc9bb22d64bd0f47896317c988e615154f97546a1993a88c35aee480089677e

  • SSDEEP

    3072:NteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzp9qM:5q7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_e1fb5b416ee72e6d152fd0bdfc058ec9bc868b8b7acac95972522485066121ac

    • Size

      188KB

    • MD5

      5eadb97e9d3dbcb92d18660699bcc851

    • SHA1

      4fbe790c556af06b25cb8c514517c1eb81eba72a

    • SHA256

      e1fb5b416ee72e6d152fd0bdfc058ec9bc868b8b7acac95972522485066121ac

    • SHA512

      a4592bf90c4f52b33a193b63dac1224c4eebec65f562413fd6af40bb5b7660556cc9bb22d64bd0f47896317c988e615154f97546a1993a88c35aee480089677e

    • SSDEEP

      3072:NteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzp9qM:5q7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks