General

  • Target

    JaffaCakes118_512a1a78d3948a53a6d38a130c6056150d6b55f0870bba90cae3f73742712562

  • Size

    188KB

  • Sample

    241223-wca59awnhp

  • MD5

    e5828dfecf778a1f46bcc6424149b6fb

  • SHA1

    4ed6ae00dc4172d1f99d4d0ca26b6e0c93885840

  • SHA256

    512a1a78d3948a53a6d38a130c6056150d6b55f0870bba90cae3f73742712562

  • SHA512

    4f7c540f55edcf637ef825a67f6e520713f307bce444a03e9d62b8197f86e9d17e78e0abef3971805e552aa916048be2a9324ef8d43c7468d8cbcb696dfef0c3

  • SSDEEP

    3072:XA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAoSo:XzIqATVfQeV2FZalKq6jtGJWuTmd

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.82.248.59:443

54.39.98.141:6602

103.109.247.8:10443

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_512a1a78d3948a53a6d38a130c6056150d6b55f0870bba90cae3f73742712562

    • Size

      188KB

    • MD5

      e5828dfecf778a1f46bcc6424149b6fb

    • SHA1

      4ed6ae00dc4172d1f99d4d0ca26b6e0c93885840

    • SHA256

      512a1a78d3948a53a6d38a130c6056150d6b55f0870bba90cae3f73742712562

    • SHA512

      4f7c540f55edcf637ef825a67f6e520713f307bce444a03e9d62b8197f86e9d17e78e0abef3971805e552aa916048be2a9324ef8d43c7468d8cbcb696dfef0c3

    • SSDEEP

      3072:XA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAoSo:XzIqATVfQeV2FZalKq6jtGJWuTmd

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks