General

  • Target

    JaffaCakes118_4976326d20d46ce904e188b5686173b27bcb10ef07b0d699e5a4982bf38afbbb

  • Size

    188KB

  • Sample

    241223-1kaa5ssmdk

  • MD5

    c1b8f517da652414ad2609d56d4a2f0c

  • SHA1

    32f09a3b60253bc3980df54c06b50954634b075f

  • SHA256

    4976326d20d46ce904e188b5686173b27bcb10ef07b0d699e5a4982bf38afbbb

  • SHA512

    64ef77a501e2de3bf31c2b0f12b16f4016d41029379abe6c37c5712b9500884a22470613506dedc4b353588371d40ff1a48a7a2095fc237b1a5d18edc62c210a

  • SSDEEP

    3072:FA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAogo:FzIqATVfQeV2FZalKq6jtGJWuTmd

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.82.248.59:443

54.39.98.141:6602

103.109.247.8:10443

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_4976326d20d46ce904e188b5686173b27bcb10ef07b0d699e5a4982bf38afbbb

    • Size

      188KB

    • MD5

      c1b8f517da652414ad2609d56d4a2f0c

    • SHA1

      32f09a3b60253bc3980df54c06b50954634b075f

    • SHA256

      4976326d20d46ce904e188b5686173b27bcb10ef07b0d699e5a4982bf38afbbb

    • SHA512

      64ef77a501e2de3bf31c2b0f12b16f4016d41029379abe6c37c5712b9500884a22470613506dedc4b353588371d40ff1a48a7a2095fc237b1a5d18edc62c210a

    • SSDEEP

      3072:FA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAogo:FzIqATVfQeV2FZalKq6jtGJWuTmd

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks