General

  • Target

    JaffaCakes118_154af253878226c8ef40089fc170c292433758866f21db2f16f791c7f4d8b561

  • Size

    188KB

  • Sample

    241230-zp7xja1lgw

  • MD5

    481221824dfbeb72c29a43f972332872

  • SHA1

    0c291ca2a83cf6bd53445d0474ad9b7a7396a065

  • SHA256

    154af253878226c8ef40089fc170c292433758866f21db2f16f791c7f4d8b561

  • SHA512

    77a4b8dc0c422d4a64f14c1144fb23db06bf39bf87051c01d4b25c64c4e62d62679806b06e905515d8138407817a0967414f69982041b9f8912807703efadde4

  • SSDEEP

    3072:ateMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzZ9qM:Sq7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_154af253878226c8ef40089fc170c292433758866f21db2f16f791c7f4d8b561

    • Size

      188KB

    • MD5

      481221824dfbeb72c29a43f972332872

    • SHA1

      0c291ca2a83cf6bd53445d0474ad9b7a7396a065

    • SHA256

      154af253878226c8ef40089fc170c292433758866f21db2f16f791c7f4d8b561

    • SHA512

      77a4b8dc0c422d4a64f14c1144fb23db06bf39bf87051c01d4b25c64c4e62d62679806b06e905515d8138407817a0967414f69982041b9f8912807703efadde4

    • SSDEEP

      3072:ateMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzZ9qM:Sq7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks