General

  • Target

    JaffaCakes118_ab3cc8605b8ad70f3a69971375ef8763c7dea182d1b020e63740ce1e966df0da

  • Size

    188KB

  • Sample

    241230-yv4avswphn

  • MD5

    e3b5123bb63a55215f8f90de8f08fba0

  • SHA1

    c7817f5e0b609f1c8e9b809533e5b1111f3d5055

  • SHA256

    ab3cc8605b8ad70f3a69971375ef8763c7dea182d1b020e63740ce1e966df0da

  • SHA512

    1a4bae01ed2aa0760fa9552b2915aad78a3e65d47255bc3f3c1aff516a572b4391ceffd244ff727c8f629449147e488ec65c0b8f9979f519f13d1b72b0f0ee2f

  • SSDEEP

    3072:LteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIz39qM:Dq7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_ab3cc8605b8ad70f3a69971375ef8763c7dea182d1b020e63740ce1e966df0da

    • Size

      188KB

    • MD5

      e3b5123bb63a55215f8f90de8f08fba0

    • SHA1

      c7817f5e0b609f1c8e9b809533e5b1111f3d5055

    • SHA256

      ab3cc8605b8ad70f3a69971375ef8763c7dea182d1b020e63740ce1e966df0da

    • SHA512

      1a4bae01ed2aa0760fa9552b2915aad78a3e65d47255bc3f3c1aff516a572b4391ceffd244ff727c8f629449147e488ec65c0b8f9979f519f13d1b72b0f0ee2f

    • SSDEEP

      3072:LteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIz39qM:Dq7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks