General

  • Target

    JaffaCakes118_32da0a3e2196ac5e4d439d7e4fbc7d854a34f6fcd284919822aeaa9b3f412ff1

  • Size

    188KB

  • Sample

    241230-v1tf3a1lfp

  • MD5

    e1184d911eb5e7d04673a2c2808076ad

  • SHA1

    f7a0792a5a612e4d984f6d362027396635593688

  • SHA256

    32da0a3e2196ac5e4d439d7e4fbc7d854a34f6fcd284919822aeaa9b3f412ff1

  • SHA512

    6b6d53b72e832465e0354974ce4e7f80f78e50adbf7be2b3061806b53773ec85ec33ac28f396345b3efb5dfffca1321941ea1deabc8fc82d7e0127dc1ea7217e

  • SSDEEP

    3072:pA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAomo:pzIqATVfQeV2FZalKq6jtGJWuTmd

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.82.248.59:443

54.39.98.141:6602

103.109.247.8:10443

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_32da0a3e2196ac5e4d439d7e4fbc7d854a34f6fcd284919822aeaa9b3f412ff1

    • Size

      188KB

    • MD5

      e1184d911eb5e7d04673a2c2808076ad

    • SHA1

      f7a0792a5a612e4d984f6d362027396635593688

    • SHA256

      32da0a3e2196ac5e4d439d7e4fbc7d854a34f6fcd284919822aeaa9b3f412ff1

    • SHA512

      6b6d53b72e832465e0354974ce4e7f80f78e50adbf7be2b3061806b53773ec85ec33ac28f396345b3efb5dfffca1321941ea1deabc8fc82d7e0127dc1ea7217e

    • SSDEEP

      3072:pA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAomo:pzIqATVfQeV2FZalKq6jtGJWuTmd

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks