General

  • Target

    JaffaCakes118_fdeb7084145bd065a721ad32f014e7b14045f824f2bf675c4f7389c6236d5a20

  • Size

    188KB

  • Sample

    241230-gb4c3szmfp

  • MD5

    b7bd6cf1cb87622ee5ba34763d4463a5

  • SHA1

    34ed34228062facbdaa6144ef842c09cd3ea5dd7

  • SHA256

    fdeb7084145bd065a721ad32f014e7b14045f824f2bf675c4f7389c6236d5a20

  • SHA512

    ca3439c379fbf4120bb6632c1e761ef810c57d92a96a65690bec53f3ee842a99f28662e84e0d580373a8ff7040a65a456acfbb9f11528ec73bbc2fb90a137f48

  • SSDEEP

    3072:eA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAoWo:ezIqATVfQeV2FZalKq6jtGJWuTmd

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.82.248.59:443

54.39.98.141:6602

103.109.247.8:10443

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_fdeb7084145bd065a721ad32f014e7b14045f824f2bf675c4f7389c6236d5a20

    • Size

      188KB

    • MD5

      b7bd6cf1cb87622ee5ba34763d4463a5

    • SHA1

      34ed34228062facbdaa6144ef842c09cd3ea5dd7

    • SHA256

      fdeb7084145bd065a721ad32f014e7b14045f824f2bf675c4f7389c6236d5a20

    • SHA512

      ca3439c379fbf4120bb6632c1e761ef810c57d92a96a65690bec53f3ee842a99f28662e84e0d580373a8ff7040a65a456acfbb9f11528ec73bbc2fb90a137f48

    • SSDEEP

      3072:eA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAoWo:ezIqATVfQeV2FZalKq6jtGJWuTmd

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks