General

  • Target

    JaffaCakes118_ac862d34d1e0cd012fdd9be44c21c257b003733d87b1197d0ffcd10b1f399a05

  • Size

    188KB

  • Sample

    241224-d1dl6s1kb1

  • MD5

    73d7612d68e6d95afa8638cf956c7c01

  • SHA1

    03708936a45cb3e6e4bb2084f0e2fe3e359a8460

  • SHA256

    ac862d34d1e0cd012fdd9be44c21c257b003733d87b1197d0ffcd10b1f399a05

  • SHA512

    fab8b94ba1569b15b986e4448e3f1435190eca436c55ec3dfd971eda77c9b7cdafd3f90e7b951f81e4c6eef1824982f1318011eaf32acab53304c532b4ef3aa6

  • SSDEEP

    3072:OA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAoOo:OzIqATVfQeV2FZalKq6jtGJWuTmd

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.82.248.59:443

54.39.98.141:6602

103.109.247.8:10443

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_ac862d34d1e0cd012fdd9be44c21c257b003733d87b1197d0ffcd10b1f399a05

    • Size

      188KB

    • MD5

      73d7612d68e6d95afa8638cf956c7c01

    • SHA1

      03708936a45cb3e6e4bb2084f0e2fe3e359a8460

    • SHA256

      ac862d34d1e0cd012fdd9be44c21c257b003733d87b1197d0ffcd10b1f399a05

    • SHA512

      fab8b94ba1569b15b986e4448e3f1435190eca436c55ec3dfd971eda77c9b7cdafd3f90e7b951f81e4c6eef1824982f1318011eaf32acab53304c532b4ef3aa6

    • SSDEEP

      3072:OA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAoOo:OzIqATVfQeV2FZalKq6jtGJWuTmd

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks