General

  • Target

    JaffaCakes118_f4f53a86caa052f5e82727f95d418c73c90fd7b4d394c4ee86b975f311bd2a0f

  • Size

    188KB

  • Sample

    241230-yps8psynf1

  • MD5

    ad850180d6f20f2a449cd6a7c271fca5

  • SHA1

    d38d9de6907617ccea01386831ebeab6bbb15f24

  • SHA256

    f4f53a86caa052f5e82727f95d418c73c90fd7b4d394c4ee86b975f311bd2a0f

  • SHA512

    cbf04d1cb7643878d3aee94eac0baa7614e9c83af406512eb82ee46c171461e4adb963af80d64ca0f14b9dd8c86b03f9ad136b706b7d4ef374aa6d14c5fa716d

  • SSDEEP

    3072:qA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAoao:qzIqATVfQeV2FZalKq6jtGJWuTmd

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.82.248.59:443

54.39.98.141:6602

103.109.247.8:10443

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_f4f53a86caa052f5e82727f95d418c73c90fd7b4d394c4ee86b975f311bd2a0f

    • Size

      188KB

    • MD5

      ad850180d6f20f2a449cd6a7c271fca5

    • SHA1

      d38d9de6907617ccea01386831ebeab6bbb15f24

    • SHA256

      f4f53a86caa052f5e82727f95d418c73c90fd7b4d394c4ee86b975f311bd2a0f

    • SHA512

      cbf04d1cb7643878d3aee94eac0baa7614e9c83af406512eb82ee46c171461e4adb963af80d64ca0f14b9dd8c86b03f9ad136b706b7d4ef374aa6d14c5fa716d

    • SSDEEP

      3072:qA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAoao:qzIqATVfQeV2FZalKq6jtGJWuTmd

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks