General

  • Target

    JaffaCakes118_e57e01b3efa8bf044e8ac04e260b0a3de875090daa3af048e303503451631f42

  • Size

    188KB

  • Sample

    241223-2mbsestpgm

  • MD5

    1a3b3b3d6348c79774040c3514200860

  • SHA1

    a3fdbced23cd13d89576d42e371217066eb12db4

  • SHA256

    e57e01b3efa8bf044e8ac04e260b0a3de875090daa3af048e303503451631f42

  • SHA512

    82b03f3d62012cf75963eb0b455917908edc28423ec8e5fc094528efcef663bad3162f11a82bd06163e8368225df715f56de70f2cffaaed3c1e285992d7ee437

  • SSDEEP

    3072:SA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAo4o:SzIqATVfQeV2FZalKq6jtGJWuTmd

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.82.248.59:443

54.39.98.141:6602

103.109.247.8:10443

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_e57e01b3efa8bf044e8ac04e260b0a3de875090daa3af048e303503451631f42

    • Size

      188KB

    • MD5

      1a3b3b3d6348c79774040c3514200860

    • SHA1

      a3fdbced23cd13d89576d42e371217066eb12db4

    • SHA256

      e57e01b3efa8bf044e8ac04e260b0a3de875090daa3af048e303503451631f42

    • SHA512

      82b03f3d62012cf75963eb0b455917908edc28423ec8e5fc094528efcef663bad3162f11a82bd06163e8368225df715f56de70f2cffaaed3c1e285992d7ee437

    • SSDEEP

      3072:SA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAo4o:SzIqATVfQeV2FZalKq6jtGJWuTmd

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks