General

  • Target

    JaffaCakes118_4797b95d08d601e8798733f9448adf60c15cc5f628fd87e8fcfb2aff0103dbc7

  • Size

    188KB

  • Sample

    241230-zt7gka1nbs

  • MD5

    ddafbb5e47aee988ea42e14ff5ca0bb1

  • SHA1

    6620a10319c783acb2d8cef57c4dff666c39a1e5

  • SHA256

    4797b95d08d601e8798733f9448adf60c15cc5f628fd87e8fcfb2aff0103dbc7

  • SHA512

    edd80f999568f2087a96e354e95ae57ff160f34a16cde7aab06d923031e60442f90554786e7e74d7e2869f37ea05c386141ae1718e3d218b42e165ad521c7998

  • SSDEEP

    3072:CteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzh9qM:qq7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_4797b95d08d601e8798733f9448adf60c15cc5f628fd87e8fcfb2aff0103dbc7

    • Size

      188KB

    • MD5

      ddafbb5e47aee988ea42e14ff5ca0bb1

    • SHA1

      6620a10319c783acb2d8cef57c4dff666c39a1e5

    • SHA256

      4797b95d08d601e8798733f9448adf60c15cc5f628fd87e8fcfb2aff0103dbc7

    • SHA512

      edd80f999568f2087a96e354e95ae57ff160f34a16cde7aab06d923031e60442f90554786e7e74d7e2869f37ea05c386141ae1718e3d218b42e165ad521c7998

    • SSDEEP

      3072:CteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzh9qM:qq7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks