General

  • Target

    JaffaCakes118_0c0e050e668aacde3d62ca277a480d59e68e84f297d64af73b6f779f7a708baf

  • Size

    188KB

  • Sample

    241230-yfq2zsvrgp

  • MD5

    bbd7739952ae8d7f05706e3bd37b15db

  • SHA1

    17acf6d7c088be31f99b48ab99010906506818b0

  • SHA256

    0c0e050e668aacde3d62ca277a480d59e68e84f297d64af73b6f779f7a708baf

  • SHA512

    4c9bcd2017738864c64165f7fcfafcc194ca2070e2e73ee90a88fbe03d9519cc1e9b3b38eb8769a12388433a788d3d5e7360909f815eb24360c197261749716c

  • SSDEEP

    3072:2teMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzI9qM:+q7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_0c0e050e668aacde3d62ca277a480d59e68e84f297d64af73b6f779f7a708baf

    • Size

      188KB

    • MD5

      bbd7739952ae8d7f05706e3bd37b15db

    • SHA1

      17acf6d7c088be31f99b48ab99010906506818b0

    • SHA256

      0c0e050e668aacde3d62ca277a480d59e68e84f297d64af73b6f779f7a708baf

    • SHA512

      4c9bcd2017738864c64165f7fcfafcc194ca2070e2e73ee90a88fbe03d9519cc1e9b3b38eb8769a12388433a788d3d5e7360909f815eb24360c197261749716c

    • SSDEEP

      3072:2teMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzI9qM:+q7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks