General

  • Target

    JaffaCakes118_9abaea40b68e2e37ff5f5309de65d40c9bd26cb61275d1e4e27611410f76d4b2

  • Size

    188KB

  • Sample

    241223-ybyahayncv

  • MD5

    65ef2a8c0d1c4613b71b6c33f27facdf

  • SHA1

    ac1b9ef192d39c92e3b5ef9c035b0bbb5d4e67ba

  • SHA256

    9abaea40b68e2e37ff5f5309de65d40c9bd26cb61275d1e4e27611410f76d4b2

  • SHA512

    00457ffb1a506fb1d2e73abcfd2df68be8bc514a54f41b1c51de765402d9d1d447cae934162c8996b6b1a853593c145bfdd031f794ec6b18b8bac1cbbecd8269

  • SSDEEP

    3072:CA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAoco:CzIqATVfQeV2FZalKq6jtGJWuTmd

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.82.248.59:443

54.39.98.141:6602

103.109.247.8:10443

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_9abaea40b68e2e37ff5f5309de65d40c9bd26cb61275d1e4e27611410f76d4b2

    • Size

      188KB

    • MD5

      65ef2a8c0d1c4613b71b6c33f27facdf

    • SHA1

      ac1b9ef192d39c92e3b5ef9c035b0bbb5d4e67ba

    • SHA256

      9abaea40b68e2e37ff5f5309de65d40c9bd26cb61275d1e4e27611410f76d4b2

    • SHA512

      00457ffb1a506fb1d2e73abcfd2df68be8bc514a54f41b1c51de765402d9d1d447cae934162c8996b6b1a853593c145bfdd031f794ec6b18b8bac1cbbecd8269

    • SSDEEP

      3072:CA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAoco:CzIqATVfQeV2FZalKq6jtGJWuTmd

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks