General

  • Target

    JaffaCakes118_20bfa3c7a79e8f4c671a81a7cfcdc73a2d5a9a41c85773f6a5df229b613ddb5a

  • Size

    188KB

  • Sample

    241230-xn996atpdj

  • MD5

    4a84d20370c4149c413e0fc40dee7798

  • SHA1

    c37583687109cef038eca6d205ed8ee38aef52ef

  • SHA256

    20bfa3c7a79e8f4c671a81a7cfcdc73a2d5a9a41c85773f6a5df229b613ddb5a

  • SHA512

    979f5fc59299e203132ff7255af259126e5cb553ac2235b25275dc77211cf72ff3fc98dbf9b9eeae921ff74fb5cd5600a4cba90f7a873b09e3bbc5d8fba1d0a9

  • SSDEEP

    3072:bA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAo0o:bzIqATVfQeV2FZalKq6jtGJWuTmd

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.82.248.59:443

54.39.98.141:6602

103.109.247.8:10443

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_20bfa3c7a79e8f4c671a81a7cfcdc73a2d5a9a41c85773f6a5df229b613ddb5a

    • Size

      188KB

    • MD5

      4a84d20370c4149c413e0fc40dee7798

    • SHA1

      c37583687109cef038eca6d205ed8ee38aef52ef

    • SHA256

      20bfa3c7a79e8f4c671a81a7cfcdc73a2d5a9a41c85773f6a5df229b613ddb5a

    • SHA512

      979f5fc59299e203132ff7255af259126e5cb553ac2235b25275dc77211cf72ff3fc98dbf9b9eeae921ff74fb5cd5600a4cba90f7a873b09e3bbc5d8fba1d0a9

    • SSDEEP

      3072:bA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAo0o:bzIqATVfQeV2FZalKq6jtGJWuTmd

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks