General

  • Target

    JaffaCakes118_16630ecb717241a6c79f5b0b3e91d96450b6b34d7810278f737827403ec8f4be

  • Size

    188KB

  • Sample

    241230-z1fx7a1qe1

  • MD5

    11384b68fdf80e3cf13a9428df0c2270

  • SHA1

    ce95918a7f1dacfc460d72ce64f287233c5b8594

  • SHA256

    16630ecb717241a6c79f5b0b3e91d96450b6b34d7810278f737827403ec8f4be

  • SHA512

    13eb8fb28de738eb7c317d856078fea328b17a2211052549e183a11c18d7722e6747cbe31b75d5ac147723f715b05b9fd0b4ac02ed679aac31f1ae59766f699d

  • SSDEEP

    3072:eA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAodo:ezIqATVfQeV2FZalKq6jtGJWuTmd

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.82.248.59:443

54.39.98.141:6602

103.109.247.8:10443

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_16630ecb717241a6c79f5b0b3e91d96450b6b34d7810278f737827403ec8f4be

    • Size

      188KB

    • MD5

      11384b68fdf80e3cf13a9428df0c2270

    • SHA1

      ce95918a7f1dacfc460d72ce64f287233c5b8594

    • SHA256

      16630ecb717241a6c79f5b0b3e91d96450b6b34d7810278f737827403ec8f4be

    • SHA512

      13eb8fb28de738eb7c317d856078fea328b17a2211052549e183a11c18d7722e6747cbe31b75d5ac147723f715b05b9fd0b4ac02ed679aac31f1ae59766f699d

    • SSDEEP

      3072:eA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAodo:ezIqATVfQeV2FZalKq6jtGJWuTmd

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks