General

  • Target

    JaffaCakes118_20b27a4c5af6a807a56826275a6a981b3f4ecbf48b62a54e0602f260a5f5c3e6

  • Size

    188KB

  • Sample

    241230-z3jf4aypcr

  • MD5

    3daeb4bf340049aa71dc5d819d3d54d7

  • SHA1

    fb80eebab126f7f675c98a46f4203be2e240e527

  • SHA256

    20b27a4c5af6a807a56826275a6a981b3f4ecbf48b62a54e0602f260a5f5c3e6

  • SHA512

    5a80d1704dbbca5e70353a5adb70ccf2629fc6d544209cb6d8eabef765fae0c3efbacb59df0236e21b2a303fc31ecb7ec261ca2c108597a5d10ec65b7db36254

  • SSDEEP

    3072:pteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzv9qM:lq7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_20b27a4c5af6a807a56826275a6a981b3f4ecbf48b62a54e0602f260a5f5c3e6

    • Size

      188KB

    • MD5

      3daeb4bf340049aa71dc5d819d3d54d7

    • SHA1

      fb80eebab126f7f675c98a46f4203be2e240e527

    • SHA256

      20b27a4c5af6a807a56826275a6a981b3f4ecbf48b62a54e0602f260a5f5c3e6

    • SHA512

      5a80d1704dbbca5e70353a5adb70ccf2629fc6d544209cb6d8eabef765fae0c3efbacb59df0236e21b2a303fc31ecb7ec261ca2c108597a5d10ec65b7db36254

    • SSDEEP

      3072:pteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzv9qM:lq7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks