General

  • Target

    JaffaCakes118_aef0d7fe6d1563dd2715977497c6d021438856bf594118b34b40583a417f6fd8

  • Size

    188KB

  • Sample

    241223-11ldcasqfs

  • MD5

    d13ff1df7890bbab8202bfa4cf95ae56

  • SHA1

    8c3bde281e877a0402704b4f9ed3634feccaeb30

  • SHA256

    aef0d7fe6d1563dd2715977497c6d021438856bf594118b34b40583a417f6fd8

  • SHA512

    4fd62bc714d8d3125ea7f1488a9d1844cf59eb80a657884250dc2da080995ac5af08fc8815f07205381c9ce5c42d33c594d61d4d5b13ebda3fe0ea117bf2c29e

  • SSDEEP

    3072:xA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAoho:xzIqATVfQeV2FZalKq6jtGJWuTmd

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.82.248.59:443

54.39.98.141:6602

103.109.247.8:10443

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_aef0d7fe6d1563dd2715977497c6d021438856bf594118b34b40583a417f6fd8

    • Size

      188KB

    • MD5

      d13ff1df7890bbab8202bfa4cf95ae56

    • SHA1

      8c3bde281e877a0402704b4f9ed3634feccaeb30

    • SHA256

      aef0d7fe6d1563dd2715977497c6d021438856bf594118b34b40583a417f6fd8

    • SHA512

      4fd62bc714d8d3125ea7f1488a9d1844cf59eb80a657884250dc2da080995ac5af08fc8815f07205381c9ce5c42d33c594d61d4d5b13ebda3fe0ea117bf2c29e

    • SSDEEP

      3072:xA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAoho:xzIqATVfQeV2FZalKq6jtGJWuTmd

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks