General

  • Target

    JaffaCakes118_13d3e1053627c7b2d222d2c2e121af4004497580282316526d479ca8e3b6f625

  • Size

    188KB

  • Sample

    241230-z7skkaskdw

  • MD5

    ad951e8845a7ef1d558bc4169d876df2

  • SHA1

    890929e2410399c8bcefae910a70530ea0f5b797

  • SHA256

    13d3e1053627c7b2d222d2c2e121af4004497580282316526d479ca8e3b6f625

  • SHA512

    d5ed4b3a2c0199a1684e5ed43b20e81cad99458b125150ac73ac9cb007c86034683c840ce79b2bdc48f98acdb254073eb0901478afc84733979afa973e2aa601

  • SSDEEP

    3072:wA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAo2o:wzIqATVfQeV2FZalKq6jtGJWuTmd

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.82.248.59:443

54.39.98.141:6602

103.109.247.8:10443

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_13d3e1053627c7b2d222d2c2e121af4004497580282316526d479ca8e3b6f625

    • Size

      188KB

    • MD5

      ad951e8845a7ef1d558bc4169d876df2

    • SHA1

      890929e2410399c8bcefae910a70530ea0f5b797

    • SHA256

      13d3e1053627c7b2d222d2c2e121af4004497580282316526d479ca8e3b6f625

    • SHA512

      d5ed4b3a2c0199a1684e5ed43b20e81cad99458b125150ac73ac9cb007c86034683c840ce79b2bdc48f98acdb254073eb0901478afc84733979afa973e2aa601

    • SSDEEP

      3072:wA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAo2o:wzIqATVfQeV2FZalKq6jtGJWuTmd

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks