General

  • Target

    JaffaCakes118_62a3514fb73b8392958cb2e9db9cbb53280e81024c9054048a9f25cf76467c59

  • Size

    188KB

  • Sample

    241230-zxkrza1pbx

  • MD5

    ed6fe4c6e145bd3d22cc92164f4d4184

  • SHA1

    ae8c1debffa6be32999201819c249a39e30ffe37

  • SHA256

    62a3514fb73b8392958cb2e9db9cbb53280e81024c9054048a9f25cf76467c59

  • SHA512

    36c2259c4ca3bb177208ee68877e426a2a173afe814efaad48e1443569dc093197ec7d002619e31166f4f1df435ce489100a20253f6cf0a1986d99321143b5cd

  • SSDEEP

    3072:hteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzP9qM:tq7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_62a3514fb73b8392958cb2e9db9cbb53280e81024c9054048a9f25cf76467c59

    • Size

      188KB

    • MD5

      ed6fe4c6e145bd3d22cc92164f4d4184

    • SHA1

      ae8c1debffa6be32999201819c249a39e30ffe37

    • SHA256

      62a3514fb73b8392958cb2e9db9cbb53280e81024c9054048a9f25cf76467c59

    • SHA512

      36c2259c4ca3bb177208ee68877e426a2a173afe814efaad48e1443569dc093197ec7d002619e31166f4f1df435ce489100a20253f6cf0a1986d99321143b5cd

    • SSDEEP

      3072:hteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzP9qM:tq7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks