General

  • Target

    JaffaCakes118_1eb24f31718961ac7cc7f57cbf073dc68a2dc089ea73e494f23f0a886f94a4d3

  • Size

    188KB

  • Sample

    241230-25s5estjbp

  • MD5

    4688a416bbfe3b27babf4d6322712d5a

  • SHA1

    8b17a5c1308024a970d9aaf8f702a6ed8880a779

  • SHA256

    1eb24f31718961ac7cc7f57cbf073dc68a2dc089ea73e494f23f0a886f94a4d3

  • SHA512

    ee9266e79e311e94bb09c316a209eebbb26a9ef014c660020c2576f39364e7473cec2f78e3dd938abae71fb3e9373603f0cf86499d78f41b6d80cf45d5e58578

  • SSDEEP

    3072:xA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAozo:xzIqATVfQeV2FZalKq6jtGJWuTmd

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.82.248.59:443

54.39.98.141:6602

103.109.247.8:10443

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_1eb24f31718961ac7cc7f57cbf073dc68a2dc089ea73e494f23f0a886f94a4d3

    • Size

      188KB

    • MD5

      4688a416bbfe3b27babf4d6322712d5a

    • SHA1

      8b17a5c1308024a970d9aaf8f702a6ed8880a779

    • SHA256

      1eb24f31718961ac7cc7f57cbf073dc68a2dc089ea73e494f23f0a886f94a4d3

    • SHA512

      ee9266e79e311e94bb09c316a209eebbb26a9ef014c660020c2576f39364e7473cec2f78e3dd938abae71fb3e9373603f0cf86499d78f41b6d80cf45d5e58578

    • SSDEEP

      3072:xA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAozo:xzIqATVfQeV2FZalKq6jtGJWuTmd

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks