General

  • Target

    JaffaCakes118_dd87da663ea3e8f022e65ee47207da408901975a4e69f08b49bb432c5921f61c

  • Size

    188KB

  • Sample

    241230-1hkdbszmdk

  • MD5

    cf4457bf51927a91f9804b6ebe3565db

  • SHA1

    3c8d3adb3c9290fef53314cde2eb50a27a7fdb4d

  • SHA256

    dd87da663ea3e8f022e65ee47207da408901975a4e69f08b49bb432c5921f61c

  • SHA512

    ab5b9a4aaeb7ae8105072eccf21c4a82aea70d16d6854895a3ca622cbb89159e19dfdab15370e44764ba049129f678e8366301c337fcf317cefc400cdf77ca22

  • SSDEEP

    3072:iA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAowo:izIqATVfQeV2FZalKq6jtGJWuTmd

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.82.248.59:443

54.39.98.141:6602

103.109.247.8:10443

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_dd87da663ea3e8f022e65ee47207da408901975a4e69f08b49bb432c5921f61c

    • Size

      188KB

    • MD5

      cf4457bf51927a91f9804b6ebe3565db

    • SHA1

      3c8d3adb3c9290fef53314cde2eb50a27a7fdb4d

    • SHA256

      dd87da663ea3e8f022e65ee47207da408901975a4e69f08b49bb432c5921f61c

    • SHA512

      ab5b9a4aaeb7ae8105072eccf21c4a82aea70d16d6854895a3ca622cbb89159e19dfdab15370e44764ba049129f678e8366301c337fcf317cefc400cdf77ca22

    • SSDEEP

      3072:iA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAowo:izIqATVfQeV2FZalKq6jtGJWuTmd

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks