General

  • Target

    JaffaCakes118_32581b1fd9bf67d90eb2e8468e87d7e2171bbd5e6e94ef1a7737fe65d31f0676

  • Size

    188KB

  • Sample

    241230-zm7hzsyjan

  • MD5

    5779257213f4915c2d674fde4849cd80

  • SHA1

    22fdb9215cb4b9f36e722a518ce1b5e17f2b62b2

  • SHA256

    32581b1fd9bf67d90eb2e8468e87d7e2171bbd5e6e94ef1a7737fe65d31f0676

  • SHA512

    e06624b92aba012a47d7d50c60f4f1f1123ae4ec6687a0ae4e038004d992c664dd68e85e01a3f63609f222f669ef008d15efde5acbfaae6e2ac16f5fa8586782

  • SSDEEP

    3072:RteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzD9qM:9q7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_32581b1fd9bf67d90eb2e8468e87d7e2171bbd5e6e94ef1a7737fe65d31f0676

    • Size

      188KB

    • MD5

      5779257213f4915c2d674fde4849cd80

    • SHA1

      22fdb9215cb4b9f36e722a518ce1b5e17f2b62b2

    • SHA256

      32581b1fd9bf67d90eb2e8468e87d7e2171bbd5e6e94ef1a7737fe65d31f0676

    • SHA512

      e06624b92aba012a47d7d50c60f4f1f1123ae4ec6687a0ae4e038004d992c664dd68e85e01a3f63609f222f669ef008d15efde5acbfaae6e2ac16f5fa8586782

    • SSDEEP

      3072:RteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzD9qM:9q7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks