General

  • Target

    JaffaCakes118_8727bae0c9acfebdff263cab99bb6200b6d15c0b6c0952e4306444e072bccbad

  • Size

    188KB

  • Sample

    241230-fhcchaymgx

  • MD5

    5ad41d9e7bdecadf2b5212c78de92958

  • SHA1

    21327a5bbaa94e02114e6773ab9fb5c39a1aefe9

  • SHA256

    8727bae0c9acfebdff263cab99bb6200b6d15c0b6c0952e4306444e072bccbad

  • SHA512

    890e84beb90f08d0fae5ce6f0e3cc0b752542a88ce9fe6673381b7ad0dcb0ec72153dbd7377741f5858995baa4d231aee8c8175dd12f8207b74a690ce94e8b96

  • SSDEEP

    3072:XA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAogo:XzIqATVfQeV2FZalKq6jtGJWuTmd

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.82.248.59:443

54.39.98.141:6602

103.109.247.8:10443

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_8727bae0c9acfebdff263cab99bb6200b6d15c0b6c0952e4306444e072bccbad

    • Size

      188KB

    • MD5

      5ad41d9e7bdecadf2b5212c78de92958

    • SHA1

      21327a5bbaa94e02114e6773ab9fb5c39a1aefe9

    • SHA256

      8727bae0c9acfebdff263cab99bb6200b6d15c0b6c0952e4306444e072bccbad

    • SHA512

      890e84beb90f08d0fae5ce6f0e3cc0b752542a88ce9fe6673381b7ad0dcb0ec72153dbd7377741f5858995baa4d231aee8c8175dd12f8207b74a690ce94e8b96

    • SSDEEP

      3072:XA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAogo:XzIqATVfQeV2FZalKq6jtGJWuTmd

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks