General

  • Target

    JaffaCakes118_6bd045c3d45671c72b2026f7ca54ff406436b7fc6e591d5991b36d06bf247f01

  • Size

    188KB

  • Sample

    241224-djp9mszpdy

  • MD5

    6ba848b4b81877af0cb70217f49f3c9d

  • SHA1

    32f24a7e40ec37d2c880a2c003555fa4b59d42e8

  • SHA256

    6bd045c3d45671c72b2026f7ca54ff406436b7fc6e591d5991b36d06bf247f01

  • SHA512

    af569c8919a0934dbb9a9e10d74a8e0e9fe4242905fc77235e701d29658eeae2b11a4fe192e73e8544119093992db78092c4b4d947a0a1689fef9b317f73c65c

  • SSDEEP

    3072:4A8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAoYo:4zIqATVfQeV2FZalKq6jtGJWuTmd

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.82.248.59:443

54.39.98.141:6602

103.109.247.8:10443

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_6bd045c3d45671c72b2026f7ca54ff406436b7fc6e591d5991b36d06bf247f01

    • Size

      188KB

    • MD5

      6ba848b4b81877af0cb70217f49f3c9d

    • SHA1

      32f24a7e40ec37d2c880a2c003555fa4b59d42e8

    • SHA256

      6bd045c3d45671c72b2026f7ca54ff406436b7fc6e591d5991b36d06bf247f01

    • SHA512

      af569c8919a0934dbb9a9e10d74a8e0e9fe4242905fc77235e701d29658eeae2b11a4fe192e73e8544119093992db78092c4b4d947a0a1689fef9b317f73c65c

    • SSDEEP

      3072:4A8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAoYo:4zIqATVfQeV2FZalKq6jtGJWuTmd

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks