General

  • Target

    JaffaCakes118_ecad22ff63d41e44b2596830d3c8291c3a33274b87430dd475fc9b156a92dfba

  • Size

    188KB

  • Sample

    241224-ls436avjfk

  • MD5

    34f7f561b7c19c54cf51f8c8319194c8

  • SHA1

    6989dc99bb751896468cc5c337ba077d431c4c4d

  • SHA256

    ecad22ff63d41e44b2596830d3c8291c3a33274b87430dd475fc9b156a92dfba

  • SHA512

    abd1fd35264e399e652769ce7a386f6c704b6c739c80a2c92921ff5957c31874fe6d46926dd9b0ba40887ae51f9dcdb8d1ddc7e1e9a8056dc782d9b2ecf60f7e

  • SSDEEP

    3072:HA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAo9o:HzIqATVfQeV2FZalKq6jtGJWuTmd

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.82.248.59:443

54.39.98.141:6602

103.109.247.8:10443

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_ecad22ff63d41e44b2596830d3c8291c3a33274b87430dd475fc9b156a92dfba

    • Size

      188KB

    • MD5

      34f7f561b7c19c54cf51f8c8319194c8

    • SHA1

      6989dc99bb751896468cc5c337ba077d431c4c4d

    • SHA256

      ecad22ff63d41e44b2596830d3c8291c3a33274b87430dd475fc9b156a92dfba

    • SHA512

      abd1fd35264e399e652769ce7a386f6c704b6c739c80a2c92921ff5957c31874fe6d46926dd9b0ba40887ae51f9dcdb8d1ddc7e1e9a8056dc782d9b2ecf60f7e

    • SSDEEP

      3072:HA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAo9o:HzIqATVfQeV2FZalKq6jtGJWuTmd

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks