General

  • Target

    JaffaCakes118_73e17b73cfd1de722549700c28785cffa9ae37ba4a47a0bc31a03e1311692708

  • Size

    188KB

  • Sample

    241224-aw35gswrbm

  • MD5

    49e92bffbcb37e6043a63cf3ae96ca3b

  • SHA1

    7f23a014e8943eb851b109aabf30157c5fa6140e

  • SHA256

    73e17b73cfd1de722549700c28785cffa9ae37ba4a47a0bc31a03e1311692708

  • SHA512

    8d3f4fc00188217e0f560bba642e2a09647ed5bdefb17c63e2d2d8f7d1a0aa1ce2fc56a8336aa77eb23caa9acd6ce115a0bbb66d6b404df2c94e9ca23afedaa1

  • SSDEEP

    3072:UA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAoFo:UzIqATVfQeV2FZalKq6jtGJWuTmd

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.82.248.59:443

54.39.98.141:6602

103.109.247.8:10443

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_73e17b73cfd1de722549700c28785cffa9ae37ba4a47a0bc31a03e1311692708

    • Size

      188KB

    • MD5

      49e92bffbcb37e6043a63cf3ae96ca3b

    • SHA1

      7f23a014e8943eb851b109aabf30157c5fa6140e

    • SHA256

      73e17b73cfd1de722549700c28785cffa9ae37ba4a47a0bc31a03e1311692708

    • SHA512

      8d3f4fc00188217e0f560bba642e2a09647ed5bdefb17c63e2d2d8f7d1a0aa1ce2fc56a8336aa77eb23caa9acd6ce115a0bbb66d6b404df2c94e9ca23afedaa1

    • SSDEEP

      3072:UA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAoFo:UzIqATVfQeV2FZalKq6jtGJWuTmd

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks