General

  • Target

    JaffaCakes118_29ce248d6680b22230ab67b3b9a79bb17919287f66fda85c1eb972e07a204641

  • Size

    188KB

  • Sample

    241230-wc3v9s1qeq

  • MD5

    59d93037c67b705cd4ea7a13b894cd94

  • SHA1

    9af363e1895daac39b5994b0ae89b4398a6875c5

  • SHA256

    29ce248d6680b22230ab67b3b9a79bb17919287f66fda85c1eb972e07a204641

  • SHA512

    79c883eb23e00bda5dd870b522e88f0012a79d5f40605c238074976bdad26718e048c16fdc31731359a6be197a01220535ef7a33001431030ab68f44a0fbeb70

  • SSDEEP

    3072:4A8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAozo:4zIqATVfQeV2FZalKq6jtGJWuTmd

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.82.248.59:443

54.39.98.141:6602

103.109.247.8:10443

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_29ce248d6680b22230ab67b3b9a79bb17919287f66fda85c1eb972e07a204641

    • Size

      188KB

    • MD5

      59d93037c67b705cd4ea7a13b894cd94

    • SHA1

      9af363e1895daac39b5994b0ae89b4398a6875c5

    • SHA256

      29ce248d6680b22230ab67b3b9a79bb17919287f66fda85c1eb972e07a204641

    • SHA512

      79c883eb23e00bda5dd870b522e88f0012a79d5f40605c238074976bdad26718e048c16fdc31731359a6be197a01220535ef7a33001431030ab68f44a0fbeb70

    • SSDEEP

      3072:4A8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAozo:4zIqATVfQeV2FZalKq6jtGJWuTmd

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks