General

  • Target

    JaffaCakes118_a87ef8b866bbd6c07f16ab0d19c6e26f73dc1c0a93db8c49458b7b9e9179c7ee

  • Size

    188KB

  • Sample

    241224-mp8gvavnfx

  • MD5

    dc251cf320f0c485141fc9a45847e743

  • SHA1

    387783b8960d00d630b58de19bb4a18122948aad

  • SHA256

    a87ef8b866bbd6c07f16ab0d19c6e26f73dc1c0a93db8c49458b7b9e9179c7ee

  • SHA512

    00aaa8d6ed8b73437b31908890be2cca99b0b80dc0d524a8d3aede8e99e8c24812cd5c9c66ad228166aff0f5493de467c8d9e7dd539509c8e0ab1e4303ae847e

  • SSDEEP

    3072:oA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAoFo:ozIqATVfQeV2FZalKq6jtGJWuTmd

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.82.248.59:443

54.39.98.141:6602

103.109.247.8:10443

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_a87ef8b866bbd6c07f16ab0d19c6e26f73dc1c0a93db8c49458b7b9e9179c7ee

    • Size

      188KB

    • MD5

      dc251cf320f0c485141fc9a45847e743

    • SHA1

      387783b8960d00d630b58de19bb4a18122948aad

    • SHA256

      a87ef8b866bbd6c07f16ab0d19c6e26f73dc1c0a93db8c49458b7b9e9179c7ee

    • SHA512

      00aaa8d6ed8b73437b31908890be2cca99b0b80dc0d524a8d3aede8e99e8c24812cd5c9c66ad228166aff0f5493de467c8d9e7dd539509c8e0ab1e4303ae847e

    • SSDEEP

      3072:oA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAoFo:ozIqATVfQeV2FZalKq6jtGJWuTmd

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks