General

  • Target

    JaffaCakes118_51e5fffbd21657f03c52859c530132218c48120c22570bc7b38578089f96a751

  • Size

    188KB

  • Sample

    241224-da3hlszpgr

  • MD5

    c8a9ff91a24eb419fe0bfde08ac21e43

  • SHA1

    cac17af8f0fdcef3539d3cad3c84fb9679727528

  • SHA256

    51e5fffbd21657f03c52859c530132218c48120c22570bc7b38578089f96a751

  • SHA512

    20973b3115fa142dd5c12060a0c099ff750e280cac06c8c780890f61b847b57f6e7983ef5049499ec0b92f66ec79d7785d2196a25d66011a1768a5f7c3ffa85d

  • SSDEEP

    3072:WA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAoZo:WzIqATVfQeV2FZalKq6jtGJWuTmd

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.82.248.59:443

54.39.98.141:6602

103.109.247.8:10443

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_51e5fffbd21657f03c52859c530132218c48120c22570bc7b38578089f96a751

    • Size

      188KB

    • MD5

      c8a9ff91a24eb419fe0bfde08ac21e43

    • SHA1

      cac17af8f0fdcef3539d3cad3c84fb9679727528

    • SHA256

      51e5fffbd21657f03c52859c530132218c48120c22570bc7b38578089f96a751

    • SHA512

      20973b3115fa142dd5c12060a0c099ff750e280cac06c8c780890f61b847b57f6e7983ef5049499ec0b92f66ec79d7785d2196a25d66011a1768a5f7c3ffa85d

    • SSDEEP

      3072:WA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAoZo:WzIqATVfQeV2FZalKq6jtGJWuTmd

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks