General

  • Target

    JaffaCakes118_c2030ea912da120cd09ff7c4db9498d33d10e6546fd842a7b8174f0448cca1af

  • Size

    188KB

  • Sample

    241224-dgwcwazpas

  • MD5

    66f9dc53d1a97bdf081b4e117d521001

  • SHA1

    386f47c516da3a363cea23ca419baf9a4f56e2a3

  • SHA256

    c2030ea912da120cd09ff7c4db9498d33d10e6546fd842a7b8174f0448cca1af

  • SHA512

    f163bb409bb537a6f2811e8546d921d85ba0654737cea3fc4b6ff7d4c916a045ed45d48ce70c8fd4ea99e171f374b88e091999a7172f2db23d1ac9badcf1457d

  • SSDEEP

    3072:yA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAobo:yzIqATVfQeV2FZalKq6jtGJWuTmd

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.82.248.59:443

54.39.98.141:6602

103.109.247.8:10443

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_c2030ea912da120cd09ff7c4db9498d33d10e6546fd842a7b8174f0448cca1af

    • Size

      188KB

    • MD5

      66f9dc53d1a97bdf081b4e117d521001

    • SHA1

      386f47c516da3a363cea23ca419baf9a4f56e2a3

    • SHA256

      c2030ea912da120cd09ff7c4db9498d33d10e6546fd842a7b8174f0448cca1af

    • SHA512

      f163bb409bb537a6f2811e8546d921d85ba0654737cea3fc4b6ff7d4c916a045ed45d48ce70c8fd4ea99e171f374b88e091999a7172f2db23d1ac9badcf1457d

    • SSDEEP

      3072:yA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAobo:yzIqATVfQeV2FZalKq6jtGJWuTmd

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks