General

  • Target

    JaffaCakes118_76b915c13c9484f104f45f6736c691b5258ea4eb6b3d33d66e0961a948bde755

  • Size

    188KB

  • Sample

    241223-1h9cfsskgs

  • MD5

    d6cbce663d800d6eaef3cf3a8af52b2c

  • SHA1

    e780f2f7e303e72800844c84fe297ebeee094226

  • SHA256

    76b915c13c9484f104f45f6736c691b5258ea4eb6b3d33d66e0961a948bde755

  • SHA512

    b4d692361a6a61770c73b6727790f31d2bff7cb5a52de308410b88f0be485a759ccf2fab5fd26a47c9c334fb2fe5b593b9c93dab141b48cbef2550468c361d90

  • SSDEEP

    3072:2A8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAo0o:2zIqATVfQeV2FZalKq6jtGJWuTmd

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.82.248.59:443

54.39.98.141:6602

103.109.247.8:10443

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_76b915c13c9484f104f45f6736c691b5258ea4eb6b3d33d66e0961a948bde755

    • Size

      188KB

    • MD5

      d6cbce663d800d6eaef3cf3a8af52b2c

    • SHA1

      e780f2f7e303e72800844c84fe297ebeee094226

    • SHA256

      76b915c13c9484f104f45f6736c691b5258ea4eb6b3d33d66e0961a948bde755

    • SHA512

      b4d692361a6a61770c73b6727790f31d2bff7cb5a52de308410b88f0be485a759ccf2fab5fd26a47c9c334fb2fe5b593b9c93dab141b48cbef2550468c361d90

    • SSDEEP

      3072:2A8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAo0o:2zIqATVfQeV2FZalKq6jtGJWuTmd

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks