General

  • Target

    JaffaCakes118_0c23538041289c89e67a277081b3e7164b934b364b5fba957ef0e77ac88bd37e

  • Size

    188KB

  • Sample

    241230-zlr2xaxrek

  • MD5

    9679b34965f9751261d6507148e9dd08

  • SHA1

    2abef184dca9acc19ab6c04f55765dc0d393b7aa

  • SHA256

    0c23538041289c89e67a277081b3e7164b934b364b5fba957ef0e77ac88bd37e

  • SHA512

    e9eaf98d29fcb2d5df14f08f087c68cc1456be71b68c096702d9755bbad0ee1c65987f8ea3e41ee436ff6153994ba5137fd18ce649bfe440277d9a9db7ac0ad3

  • SSDEEP

    3072:JteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzY9qM:Fq7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_0c23538041289c89e67a277081b3e7164b934b364b5fba957ef0e77ac88bd37e

    • Size

      188KB

    • MD5

      9679b34965f9751261d6507148e9dd08

    • SHA1

      2abef184dca9acc19ab6c04f55765dc0d393b7aa

    • SHA256

      0c23538041289c89e67a277081b3e7164b934b364b5fba957ef0e77ac88bd37e

    • SHA512

      e9eaf98d29fcb2d5df14f08f087c68cc1456be71b68c096702d9755bbad0ee1c65987f8ea3e41ee436ff6153994ba5137fd18ce649bfe440277d9a9db7ac0ad3

    • SSDEEP

      3072:JteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzY9qM:Fq7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks