General

  • Target

    JaffaCakes118_17358721617a5b33962c9a5bb1663e9275431236738bd290cd5c8eaccdb6a8b0

  • Size

    188KB

  • Sample

    241224-cpcp3aypbs

  • MD5

    a2c467fc51e99cc66c0dae086c54e4e0

  • SHA1

    b72361dfae48eef1779f4baf8f9b755f63d8cac9

  • SHA256

    17358721617a5b33962c9a5bb1663e9275431236738bd290cd5c8eaccdb6a8b0

  • SHA512

    3038d8ee9f27b6f89067e2c57e4a17293f7aeb46b665e86156c060b5e0e0bb0bfafff89207550679d1a882e86c8b15206af237effaef068987049d757cf5ded2

  • SSDEEP

    3072:UA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAoSo:UzIqATVfQeV2FZalKq6jtGJWuTmd

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.82.248.59:443

54.39.98.141:6602

103.109.247.8:10443

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_17358721617a5b33962c9a5bb1663e9275431236738bd290cd5c8eaccdb6a8b0

    • Size

      188KB

    • MD5

      a2c467fc51e99cc66c0dae086c54e4e0

    • SHA1

      b72361dfae48eef1779f4baf8f9b755f63d8cac9

    • SHA256

      17358721617a5b33962c9a5bb1663e9275431236738bd290cd5c8eaccdb6a8b0

    • SHA512

      3038d8ee9f27b6f89067e2c57e4a17293f7aeb46b665e86156c060b5e0e0bb0bfafff89207550679d1a882e86c8b15206af237effaef068987049d757cf5ded2

    • SSDEEP

      3072:UA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAoSo:UzIqATVfQeV2FZalKq6jtGJWuTmd

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks