General

  • Target

    JaffaCakes118_ab321479859ba2e225bc209346b9f3b00328df6c2f08438809f03208c793912a

  • Size

    188KB

  • Sample

    241224-1fwctaxrbv

  • MD5

    55bedcb06eb268362957bd4e9af0bf8f

  • SHA1

    ce60b1c6b35b0a45c4ef0473d2cd7ae6ca8617ea

  • SHA256

    ab321479859ba2e225bc209346b9f3b00328df6c2f08438809f03208c793912a

  • SHA512

    9c8afacfc459d635307d4f92e3c328c86922827bdda880070c825b65d9f397ee7f3d71748b28b8f8b7539d0b10c1de77296e4b3d6b100f1f994bea72110fe71a

  • SSDEEP

    3072:pA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAoTo:pzIqATVfQeV2FZalKq6jtGJWuTmd

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.82.248.59:443

54.39.98.141:6602

103.109.247.8:10443

rc4.plain
rc4.plain

Extracted

Family

dridex

Botnet

0

Targets

    • Target

      JaffaCakes118_ab321479859ba2e225bc209346b9f3b00328df6c2f08438809f03208c793912a

    • Size

      188KB

    • MD5

      55bedcb06eb268362957bd4e9af0bf8f

    • SHA1

      ce60b1c6b35b0a45c4ef0473d2cd7ae6ca8617ea

    • SHA256

      ab321479859ba2e225bc209346b9f3b00328df6c2f08438809f03208c793912a

    • SHA512

      9c8afacfc459d635307d4f92e3c328c86922827bdda880070c825b65d9f397ee7f3d71748b28b8f8b7539d0b10c1de77296e4b3d6b100f1f994bea72110fe71a

    • SSDEEP

      3072:pA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAoTo:pzIqATVfQeV2FZalKq6jtGJWuTmd

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks