General

  • Target

    JaffaCakes118_4307288a7c2d6a9fd6bd247c2687e2b377bb4aa1deb82612617db0d605c1d0f9

  • Size

    188KB

  • Sample

    241230-zz8a2s1qdy

  • MD5

    c291dfe294a40b6ff3622e928e8f028d

  • SHA1

    2508ed50ef33b6be4997bd4a0417137f5f26e9a6

  • SHA256

    4307288a7c2d6a9fd6bd247c2687e2b377bb4aa1deb82612617db0d605c1d0f9

  • SHA512

    5b003999b824c964d0e91f402e0da05914ecb04d435cf8f255645a69238b751d2ce45146a1bc72bba438df287900155209397791c6382887c21594b18f025e04

  • SSDEEP

    3072:CteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzK9qM:qq7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_4307288a7c2d6a9fd6bd247c2687e2b377bb4aa1deb82612617db0d605c1d0f9

    • Size

      188KB

    • MD5

      c291dfe294a40b6ff3622e928e8f028d

    • SHA1

      2508ed50ef33b6be4997bd4a0417137f5f26e9a6

    • SHA256

      4307288a7c2d6a9fd6bd247c2687e2b377bb4aa1deb82612617db0d605c1d0f9

    • SHA512

      5b003999b824c964d0e91f402e0da05914ecb04d435cf8f255645a69238b751d2ce45146a1bc72bba438df287900155209397791c6382887c21594b18f025e04

    • SSDEEP

      3072:CteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzK9qM:qq7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks