General

  • Target

    f2f492e429e493de3dc50d1d0e6f1c89_JaffaCakes118

  • Size

    188KB

  • Sample

    240416-hxfdtabh58

  • MD5

    f2f492e429e493de3dc50d1d0e6f1c89

  • SHA1

    29a3c18b3c08ddea1196db7024db088554d897f5

  • SHA256

    8a33e1d8569fc15804e88298a5eb85d2c6f452e43c55ea430e92b2db3ff700d4

  • SHA512

    de45b20ffaf9dc33d9db0ab229be3c9ebada8237fa4fdb0e6eb6d00a693f89c614e3b70402077f1540cbff310928b4f4bdb21e096c80fdbc133ed5b88f475bf6

  • SSDEEP

    3072:6A8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAo1o:6zIqATVfQeV2FZalKq6jtGJWuTmd

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.82.248.59:443

54.39.98.141:6602

103.109.247.8:10443

rc4.plain
rc4.plain

Targets

    • Target

      f2f492e429e493de3dc50d1d0e6f1c89_JaffaCakes118

    • Size

      188KB

    • MD5

      f2f492e429e493de3dc50d1d0e6f1c89

    • SHA1

      29a3c18b3c08ddea1196db7024db088554d897f5

    • SHA256

      8a33e1d8569fc15804e88298a5eb85d2c6f452e43c55ea430e92b2db3ff700d4

    • SHA512

      de45b20ffaf9dc33d9db0ab229be3c9ebada8237fa4fdb0e6eb6d00a693f89c614e3b70402077f1540cbff310928b4f4bdb21e096c80fdbc133ed5b88f475bf6

    • SSDEEP

      3072:6A8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAo1o:6zIqATVfQeV2FZalKq6jtGJWuTmd

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Matrix

Tasks