General

  • Target

    JaffaCakes118_73b3c111ba82362e5ab0db96b47bbdfef7ecbefc09b7d613e4a8e4181f6e922e

  • Size

    188KB

  • Sample

    241224-ceg7ssynfp

  • MD5

    7be688b6c081dca643bca2129728b0dd

  • SHA1

    af8e6306c80a6ca05725f2aa86406f729515e2c3

  • SHA256

    73b3c111ba82362e5ab0db96b47bbdfef7ecbefc09b7d613e4a8e4181f6e922e

  • SHA512

    3a25f7e0fb8adcfb252c2fecb7228dcea5bc5f826b757fb1533f0105766698d0f1df95984707d5cbf5b4d198e921cfe595f940a483909eac8f334403706c8d95

  • SSDEEP

    3072:MA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAowo:MzIqATVfQeV2FZalKq6jtGJWuTmd

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.82.248.59:443

54.39.98.141:6602

103.109.247.8:10443

rc4.plain
1
KyrwRFvnPSJz1K6RG9FGBnfutYq4Kbv0AqNO1y41Jw
rc4.plain
1
aF35v54BafRSuy5kKzAyL5d7iE2gSrPPvsMOuf22FPl0HHQhMRlw8iMYOHxIDusi

Targets

    • Target

      JaffaCakes118_73b3c111ba82362e5ab0db96b47bbdfef7ecbefc09b7d613e4a8e4181f6e922e

    • Size

      188KB

    • MD5

      7be688b6c081dca643bca2129728b0dd

    • SHA1

      af8e6306c80a6ca05725f2aa86406f729515e2c3

    • SHA256

      73b3c111ba82362e5ab0db96b47bbdfef7ecbefc09b7d613e4a8e4181f6e922e

    • SHA512

      3a25f7e0fb8adcfb252c2fecb7228dcea5bc5f826b757fb1533f0105766698d0f1df95984707d5cbf5b4d198e921cfe595f940a483909eac8f334403706c8d95

    • SSDEEP

      3072:MA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAowo:MzIqATVfQeV2FZalKq6jtGJWuTmd

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.