General

  • Target

    ecd1601c0462f963859a2f6a5161d458_JaffaCakes118

  • Size

    188KB

  • Sample

    240411-gsrevadg95

  • MD5

    ecd1601c0462f963859a2f6a5161d458

  • SHA1

    91b83e77ea02909f5fab66e0a500d46c73f288bf

  • SHA256

    250a0c7c49dab68178c95dd3dcc2f0fc0261d7162ffc3899f0d690c462e43baf

  • SHA512

    735010ad8e2271e53d1749fafbf830ec09ae58e8473525bb7f3e4c93289e17bf0fb6444f17534f940f9ed3d1b2e53d667e90074ad475f7fd34c3f492f912b973

  • SSDEEP

    3072:fA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAono:fzIqATVfQeV2FZalKq6jtGJWuTmd

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.82.248.59:443

54.39.98.141:6602

103.109.247.8:10443

rc4.plain
rc4.plain

Targets

    • Target

      ecd1601c0462f963859a2f6a5161d458_JaffaCakes118

    • Size

      188KB

    • MD5

      ecd1601c0462f963859a2f6a5161d458

    • SHA1

      91b83e77ea02909f5fab66e0a500d46c73f288bf

    • SHA256

      250a0c7c49dab68178c95dd3dcc2f0fc0261d7162ffc3899f0d690c462e43baf

    • SHA512

      735010ad8e2271e53d1749fafbf830ec09ae58e8473525bb7f3e4c93289e17bf0fb6444f17534f940f9ed3d1b2e53d667e90074ad475f7fd34c3f492f912b973

    • SSDEEP

      3072:fA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAono:fzIqATVfQeV2FZalKq6jtGJWuTmd

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Matrix

Tasks