General

  • Target

    JaffaCakes118_ec516577f48c9496b58f8c37a1cfa7873a9a3db4d0a65665068303dcf3b75636

  • Size

    188KB

  • Sample

    241223-xb16qaxmhm

  • MD5

    4a885e37b51f45021c8b7a243c27cb54

  • SHA1

    727ca5c7dbd2348e3f2924bf099bc4e829c42424

  • SHA256

    ec516577f48c9496b58f8c37a1cfa7873a9a3db4d0a65665068303dcf3b75636

  • SHA512

    1b4c6356915f63cd04bbdf0cd9917f03feb33e748c3695e1d5c3fb50edfe8d38fc725516989728e8d309460f4c9f7edd7670d03493d1427a50bf537ba200f5ff

  • SSDEEP

    3072:uA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAoHo:uzIqATVfQeV2FZalKq6jtGJWuTmd

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.82.248.59:443

54.39.98.141:6602

103.109.247.8:10443

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_ec516577f48c9496b58f8c37a1cfa7873a9a3db4d0a65665068303dcf3b75636

    • Size

      188KB

    • MD5

      4a885e37b51f45021c8b7a243c27cb54

    • SHA1

      727ca5c7dbd2348e3f2924bf099bc4e829c42424

    • SHA256

      ec516577f48c9496b58f8c37a1cfa7873a9a3db4d0a65665068303dcf3b75636

    • SHA512

      1b4c6356915f63cd04bbdf0cd9917f03feb33e748c3695e1d5c3fb50edfe8d38fc725516989728e8d309460f4c9f7edd7670d03493d1427a50bf537ba200f5ff

    • SSDEEP

      3072:uA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAoHo:uzIqATVfQeV2FZalKq6jtGJWuTmd

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks