General

  • Target

    JaffaCakes118_211602e189217979586625fe815953a9c292a123f73576c38bf8e9c87bd0806c

  • Size

    188KB

  • Sample

    241224-mz5tpswkel

  • MD5

    9f0a47693b00601c72a343aed68ef380

  • SHA1

    06c90deb47664840cbb738ebef7215c6b41fc838

  • SHA256

    211602e189217979586625fe815953a9c292a123f73576c38bf8e9c87bd0806c

  • SHA512

    c8f2aac6ed855d853fe3dc5ea20eb5ad3c6025efc7e2b408ed83ff3866b05acd0684a94b0f02b4546f7f1580c46fa9c4fd1cd3ba73d7caaf64dd4c069e39d90d

  • SSDEEP

    3072:CA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAoFo:CzIqATVfQeV2FZalKq6jtGJWuTmd

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.82.248.59:443

54.39.98.141:6602

103.109.247.8:10443

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_211602e189217979586625fe815953a9c292a123f73576c38bf8e9c87bd0806c

    • Size

      188KB

    • MD5

      9f0a47693b00601c72a343aed68ef380

    • SHA1

      06c90deb47664840cbb738ebef7215c6b41fc838

    • SHA256

      211602e189217979586625fe815953a9c292a123f73576c38bf8e9c87bd0806c

    • SHA512

      c8f2aac6ed855d853fe3dc5ea20eb5ad3c6025efc7e2b408ed83ff3866b05acd0684a94b0f02b4546f7f1580c46fa9c4fd1cd3ba73d7caaf64dd4c069e39d90d

    • SSDEEP

      3072:CA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAoFo:CzIqATVfQeV2FZalKq6jtGJWuTmd

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks