General

  • Target

    JaffaCakes118_fd270b461dd1eff965438b52293e259380f37c3bb5e15c8b03d5d11290730599

  • Size

    188KB

  • Sample

    241230-ezd2zsxrbz

  • MD5

    57a99a344c27166985b2a9e5ddd491d6

  • SHA1

    ff434182f6a80a2557a4873fdd812fed04b9585a

  • SHA256

    fd270b461dd1eff965438b52293e259380f37c3bb5e15c8b03d5d11290730599

  • SHA512

    f40b66f50638ebc1142c8d524a792b9bd5a9a0739d476a90174c18131cc2c60b394d8de5beed944335b1aca994497ec6acb510ce1ee9cd7e567fbb045db6484c

  • SSDEEP

    3072:RA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAoVo:RzIqATVfQeV2FZalKq6jtGJWuTmd

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.82.248.59:443

54.39.98.141:6602

103.109.247.8:10443

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_fd270b461dd1eff965438b52293e259380f37c3bb5e15c8b03d5d11290730599

    • Size

      188KB

    • MD5

      57a99a344c27166985b2a9e5ddd491d6

    • SHA1

      ff434182f6a80a2557a4873fdd812fed04b9585a

    • SHA256

      fd270b461dd1eff965438b52293e259380f37c3bb5e15c8b03d5d11290730599

    • SHA512

      f40b66f50638ebc1142c8d524a792b9bd5a9a0739d476a90174c18131cc2c60b394d8de5beed944335b1aca994497ec6acb510ce1ee9cd7e567fbb045db6484c

    • SSDEEP

      3072:RA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAoVo:RzIqATVfQeV2FZalKq6jtGJWuTmd

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks