General

  • Target

    JaffaCakes118_3b2f50310c8aa8076d21d32ca164c5b987ec33b45b6ad0a903793e3364b519c9

  • Size

    188KB

  • Sample

    241230-wx88savpcz

  • MD5

    add7d6c91ebfb110dcea6dbfbfc251fa

  • SHA1

    9d65eac25277a965d0964c6d1780cc5e963e7dc0

  • SHA256

    3b2f50310c8aa8076d21d32ca164c5b987ec33b45b6ad0a903793e3364b519c9

  • SHA512

    81e60c33d4e7f031e1e7fd0169b15ee85ba7608514fb04fd6ddb20c70587efb0a9467b8945d3a56f871ad5eb61abf0127c4b25f5d1faf17aff023ba30298657f

  • SSDEEP

    3072:AA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAoGo:AzIqATVfQeV2FZalKq6jtGJWuTmd

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.82.248.59:443

54.39.98.141:6602

103.109.247.8:10443

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_3b2f50310c8aa8076d21d32ca164c5b987ec33b45b6ad0a903793e3364b519c9

    • Size

      188KB

    • MD5

      add7d6c91ebfb110dcea6dbfbfc251fa

    • SHA1

      9d65eac25277a965d0964c6d1780cc5e963e7dc0

    • SHA256

      3b2f50310c8aa8076d21d32ca164c5b987ec33b45b6ad0a903793e3364b519c9

    • SHA512

      81e60c33d4e7f031e1e7fd0169b15ee85ba7608514fb04fd6ddb20c70587efb0a9467b8945d3a56f871ad5eb61abf0127c4b25f5d1faf17aff023ba30298657f

    • SSDEEP

      3072:AA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAoGo:AzIqATVfQeV2FZalKq6jtGJWuTmd

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks