General

  • Target

    JaffaCakes118_4fcebe9f66025abfa92465f14b6b2158cd9927cc8eba852316e10b572e0136ec

  • Size

    188KB

  • Sample

    241224-dfh16azne1

  • MD5

    5027f558d49eb4fa7eb5532664cfb7b3

  • SHA1

    238df7823bdda20783b2db3277562a1f5667191c

  • SHA256

    4fcebe9f66025abfa92465f14b6b2158cd9927cc8eba852316e10b572e0136ec

  • SHA512

    f21cbd11b971c2ffefa5cca475e6ade2f3d45fa2e603eb9aa6f8339cb6d1807a2f19007fa0e16aacd2c62d5a1c6c98a4991977a34d5b4ed91326278e20514042

  • SSDEEP

    3072:9A8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAoEo:9zIqATVfQeV2FZalKq6jtGJWuTmd

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.82.248.59:443

54.39.98.141:6602

103.109.247.8:10443

rc4.plain
1
KyrwRFvnPSJz1K6RG9FGBnfutYq4Kbv0AqNO1y41Jw
rc4.plain
1
aF35v54BafRSuy5kKzAyL5d7iE2gSrPPvsMOuf22FPl0HHQhMRlw8iMYOHxIDusi

Targets

    • Target

      JaffaCakes118_4fcebe9f66025abfa92465f14b6b2158cd9927cc8eba852316e10b572e0136ec

    • Size

      188KB

    • MD5

      5027f558d49eb4fa7eb5532664cfb7b3

    • SHA1

      238df7823bdda20783b2db3277562a1f5667191c

    • SHA256

      4fcebe9f66025abfa92465f14b6b2158cd9927cc8eba852316e10b572e0136ec

    • SHA512

      f21cbd11b971c2ffefa5cca475e6ade2f3d45fa2e603eb9aa6f8339cb6d1807a2f19007fa0e16aacd2c62d5a1c6c98a4991977a34d5b4ed91326278e20514042

    • SSDEEP

      3072:9A8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAoEo:9zIqATVfQeV2FZalKq6jtGJWuTmd

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.