General

  • Target

    JaffaCakes118_316ebafd3e1b86f7c95a06b6f2cbff76e839e6385e97c933e1291a022809096c

  • Size

    188KB

  • Sample

    241230-zzq2rsynel

  • MD5

    86f7612d5ca640dc003e333b7a6bae4f

  • SHA1

    b3cbebb8225ef6477da3a2ded933b9d7043a9659

  • SHA256

    316ebafd3e1b86f7c95a06b6f2cbff76e839e6385e97c933e1291a022809096c

  • SHA512

    d0500b9315da3c3a964a5b275cb6e750e51bd0a2002cfc0416350b8c2d4020e5bb32f0cb2543473ca73c6b6ee1191419892a9fe6b1e80946e33b341955ce62cb

  • SSDEEP

    3072:IteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzQ9qM:sq7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_316ebafd3e1b86f7c95a06b6f2cbff76e839e6385e97c933e1291a022809096c

    • Size

      188KB

    • MD5

      86f7612d5ca640dc003e333b7a6bae4f

    • SHA1

      b3cbebb8225ef6477da3a2ded933b9d7043a9659

    • SHA256

      316ebafd3e1b86f7c95a06b6f2cbff76e839e6385e97c933e1291a022809096c

    • SHA512

      d0500b9315da3c3a964a5b275cb6e750e51bd0a2002cfc0416350b8c2d4020e5bb32f0cb2543473ca73c6b6ee1191419892a9fe6b1e80946e33b341955ce62cb

    • SSDEEP

      3072:IteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzQ9qM:sq7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks