General

  • Target

    JaffaCakes118_a23cc91ba102f4840c7d1ffd0cea6ad54f18c08037e061e9a9465c630324fa69

  • Size

    188KB

  • Sample

    241230-1ebl1szlbl

  • MD5

    2311533a1e0a5dd10db6b17e1603818c

  • SHA1

    396943147d9a9beeedc2705c211d4afddaf2441f

  • SHA256

    a23cc91ba102f4840c7d1ffd0cea6ad54f18c08037e061e9a9465c630324fa69

  • SHA512

    72a4731cf2612a1df79c9285e67735d63409fc9138de48d314713ae604230fea7b873acb6d4638956f7ede9069df8fd6a800e09287f328933f9f160365bc924a

  • SSDEEP

    3072:9A8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAoUo:9zIqATVfQeV2FZalKq6jtGJWuTmd

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.82.248.59:443

54.39.98.141:6602

103.109.247.8:10443

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_a23cc91ba102f4840c7d1ffd0cea6ad54f18c08037e061e9a9465c630324fa69

    • Size

      188KB

    • MD5

      2311533a1e0a5dd10db6b17e1603818c

    • SHA1

      396943147d9a9beeedc2705c211d4afddaf2441f

    • SHA256

      a23cc91ba102f4840c7d1ffd0cea6ad54f18c08037e061e9a9465c630324fa69

    • SHA512

      72a4731cf2612a1df79c9285e67735d63409fc9138de48d314713ae604230fea7b873acb6d4638956f7ede9069df8fd6a800e09287f328933f9f160365bc924a

    • SSDEEP

      3072:9A8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAoUo:9zIqATVfQeV2FZalKq6jtGJWuTmd

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks