General

  • Target

    JaffaCakes118_830ca2e985498b50d0ff437f094510ca97353a2528ff7f592467dd86ac24fe49

  • Size

    188KB

  • Sample

    241223-zx5gda1mhx

  • MD5

    cd20ce44a9d6078269bd6124f5abb0dc

  • SHA1

    f70d942b47d4ca7870bae82ecce763b6a3e37e98

  • SHA256

    830ca2e985498b50d0ff437f094510ca97353a2528ff7f592467dd86ac24fe49

  • SHA512

    5cff6c05429bbe9627d902a06bf6d4bc52ac1995c32f8317bb42968db5f728d96ceee46f29fc226ea880226dea1d2cf1ec99d209dea0ac83910f423b73e7695f

  • SSDEEP

    3072:qA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAoLo:qzIqATVfQeV2FZalKq6jtGJWuTmd

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.82.248.59:443

54.39.98.141:6602

103.109.247.8:10443

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_830ca2e985498b50d0ff437f094510ca97353a2528ff7f592467dd86ac24fe49

    • Size

      188KB

    • MD5

      cd20ce44a9d6078269bd6124f5abb0dc

    • SHA1

      f70d942b47d4ca7870bae82ecce763b6a3e37e98

    • SHA256

      830ca2e985498b50d0ff437f094510ca97353a2528ff7f592467dd86ac24fe49

    • SHA512

      5cff6c05429bbe9627d902a06bf6d4bc52ac1995c32f8317bb42968db5f728d96ceee46f29fc226ea880226dea1d2cf1ec99d209dea0ac83910f423b73e7695f

    • SSDEEP

      3072:qA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAoLo:qzIqATVfQeV2FZalKq6jtGJWuTmd

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks