General

  • Target

    JaffaCakes118_de07ca572f575a2da0d4004164482e3e2c82f110092cf8cf78bc762531663ec4

  • Size

    188KB

  • Sample

    241230-ycmv6axrcz

  • MD5

    1e7e90173610f63cc0eb1aa8248a18d8

  • SHA1

    cc9f6ca7e535af3996df5e543d826a87cc13fbf8

  • SHA256

    de07ca572f575a2da0d4004164482e3e2c82f110092cf8cf78bc762531663ec4

  • SHA512

    8638d5777f8e2a33e3ac7fc24e675914f23b59b8a11c682127d82f16b73b05d13a7a61d0024d466a86795f120b8a5c2672c19ebc4e683d4bed81c0bb91ff4ec4

  • SSDEEP

    3072:5A8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAozo:5zIqATVfQeV2FZalKq6jtGJWuTmd

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.82.248.59:443

54.39.98.141:6602

103.109.247.8:10443

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_de07ca572f575a2da0d4004164482e3e2c82f110092cf8cf78bc762531663ec4

    • Size

      188KB

    • MD5

      1e7e90173610f63cc0eb1aa8248a18d8

    • SHA1

      cc9f6ca7e535af3996df5e543d826a87cc13fbf8

    • SHA256

      de07ca572f575a2da0d4004164482e3e2c82f110092cf8cf78bc762531663ec4

    • SHA512

      8638d5777f8e2a33e3ac7fc24e675914f23b59b8a11c682127d82f16b73b05d13a7a61d0024d466a86795f120b8a5c2672c19ebc4e683d4bed81c0bb91ff4ec4

    • SSDEEP

      3072:5A8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAozo:5zIqATVfQeV2FZalKq6jtGJWuTmd

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks