General

  • Target

    JaffaCakes118_ff88e7b6d995b43d3692db3966fe124ea76707671e0a6fb7ecab5fed00bdd357

  • Size

    188KB

  • Sample

    241223-v53waswmcs

  • MD5

    b95f7bb0d32eb91440d3363aa981a5f0

  • SHA1

    10c6a1169cfd10b0b22db175219213f13cc2c637

  • SHA256

    ff88e7b6d995b43d3692db3966fe124ea76707671e0a6fb7ecab5fed00bdd357

  • SHA512

    d091b267463742e4cc426c3cd0f0a0b42bfb45fd763df6d4cef98066c4c4d4fe444eacc545dac4757723d792ff5f18a92d155c579a51c09ccf0cf7ed8ee9eb3d

  • SSDEEP

    3072:9A8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAoKo:9zIqATVfQeV2FZalKq6jtGJWuTmd

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.82.248.59:443

54.39.98.141:6602

103.109.247.8:10443

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_ff88e7b6d995b43d3692db3966fe124ea76707671e0a6fb7ecab5fed00bdd357

    • Size

      188KB

    • MD5

      b95f7bb0d32eb91440d3363aa981a5f0

    • SHA1

      10c6a1169cfd10b0b22db175219213f13cc2c637

    • SHA256

      ff88e7b6d995b43d3692db3966fe124ea76707671e0a6fb7ecab5fed00bdd357

    • SHA512

      d091b267463742e4cc426c3cd0f0a0b42bfb45fd763df6d4cef98066c4c4d4fe444eacc545dac4757723d792ff5f18a92d155c579a51c09ccf0cf7ed8ee9eb3d

    • SSDEEP

      3072:9A8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAoKo:9zIqATVfQeV2FZalKq6jtGJWuTmd

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks