General

  • Target

    f201ea9402a902c7f8bddc4ca7d4d53b_JaffaCakes118

  • Size

    188KB

  • Sample

    240415-1rj4xsbd7t

  • MD5

    f201ea9402a902c7f8bddc4ca7d4d53b

  • SHA1

    48d56cf9e8b2b3df9904f71f2ce8bec8ec74cde4

  • SHA256

    76c1389d340f2f081630adc33c57727d1483e624258114636cb6b8ee32eefb68

  • SHA512

    de3b0dea54b6a33e6f89d6e33903b6ed6d42c30e966537429cc1e71f4547e49db03100bf433a9a8b9ff8d1a979f8e027ec3ea902b9f9502b93f0ef5597434419

  • SSDEEP

    3072:7A8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAoRo:7zIqATVfQeV2FZalKq6jtGJWuTmd

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.82.248.59:443

54.39.98.141:6602

103.109.247.8:10443

rc4.plain
rc4.plain

Targets

    • Target

      f201ea9402a902c7f8bddc4ca7d4d53b_JaffaCakes118

    • Size

      188KB

    • MD5

      f201ea9402a902c7f8bddc4ca7d4d53b

    • SHA1

      48d56cf9e8b2b3df9904f71f2ce8bec8ec74cde4

    • SHA256

      76c1389d340f2f081630adc33c57727d1483e624258114636cb6b8ee32eefb68

    • SHA512

      de3b0dea54b6a33e6f89d6e33903b6ed6d42c30e966537429cc1e71f4547e49db03100bf433a9a8b9ff8d1a979f8e027ec3ea902b9f9502b93f0ef5597434419

    • SSDEEP

      3072:7A8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAoRo:7zIqATVfQeV2FZalKq6jtGJWuTmd

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Matrix

Tasks