General

  • Target

    JaffaCakes118_0bd5ee9378512329b8d21fe12cc1a54822771651c44b75c60b371d64485df865

  • Size

    188KB

  • Sample

    241230-zyf56s1pez

  • MD5

    caaf2fbda90d753e757b6e0f15e46236

  • SHA1

    cec172b41eed541d5d757ae832fb078a498113ef

  • SHA256

    0bd5ee9378512329b8d21fe12cc1a54822771651c44b75c60b371d64485df865

  • SHA512

    991eafdba48b243f18b0f4b2bf105f83011af31ab7e7d9396f0ad2ee53204b3953ecb75e324cbfa8f26a05591ae26b98569e5594e0d8be4205e49db43d08c9f0

  • SSDEEP

    3072:mteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIz/9qM:Oq7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_0bd5ee9378512329b8d21fe12cc1a54822771651c44b75c60b371d64485df865

    • Size

      188KB

    • MD5

      caaf2fbda90d753e757b6e0f15e46236

    • SHA1

      cec172b41eed541d5d757ae832fb078a498113ef

    • SHA256

      0bd5ee9378512329b8d21fe12cc1a54822771651c44b75c60b371d64485df865

    • SHA512

      991eafdba48b243f18b0f4b2bf105f83011af31ab7e7d9396f0ad2ee53204b3953ecb75e324cbfa8f26a05591ae26b98569e5594e0d8be4205e49db43d08c9f0

    • SSDEEP

      3072:mteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIz/9qM:Oq7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks