General

  • Target

    JaffaCakes118_9d1dafd33c305472ee8109d091a0f90349576929ca146ba5b8d3bed0d98f7e4c

  • Size

    188KB

  • Sample

    241230-ynqq7aynbs

  • MD5

    5b7063780dff8d79de8da7b64db31e68

  • SHA1

    d5cedbdf164db246bd3b3c8c0f30f924f817c956

  • SHA256

    9d1dafd33c305472ee8109d091a0f90349576929ca146ba5b8d3bed0d98f7e4c

  • SHA512

    d2f4cd7208ac3085c057e455088e3689b964408aeb6e2e1a1043ad95b46903fca9a9e6bd3343993a66f2e3e401f7ce304e990120b3101a32cf6322266a145515

  • SSDEEP

    3072:OteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzX9qM:mq7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_9d1dafd33c305472ee8109d091a0f90349576929ca146ba5b8d3bed0d98f7e4c

    • Size

      188KB

    • MD5

      5b7063780dff8d79de8da7b64db31e68

    • SHA1

      d5cedbdf164db246bd3b3c8c0f30f924f817c956

    • SHA256

      9d1dafd33c305472ee8109d091a0f90349576929ca146ba5b8d3bed0d98f7e4c

    • SHA512

      d2f4cd7208ac3085c057e455088e3689b964408aeb6e2e1a1043ad95b46903fca9a9e6bd3343993a66f2e3e401f7ce304e990120b3101a32cf6322266a145515

    • SSDEEP

      3072:OteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzX9qM:mq7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks