General

  • Target

    JaffaCakes118_6d3060121da88f419f2ca61a538b2739857770a82e2b25abebfb60f4150cab4f

  • Size

    188KB

  • Sample

    241230-zh8v9azrhw

  • MD5

    ca41242f8d5b4ea0e6e7c27ac5986c8b

  • SHA1

    2fda20eb1588b4c75330d2ddcdad129d4bac479c

  • SHA256

    6d3060121da88f419f2ca61a538b2739857770a82e2b25abebfb60f4150cab4f

  • SHA512

    a99c03d4f300b0828ca6172753495b53b79c05630765b78924355c42bcd6d6c8806b322baf572c9162e3fb2a92a95380552f67d31347a99f2ce83ba150785190

  • SSDEEP

    3072:DA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAogo:DzIqATVfQeV2FZalKq6jtGJWuTmd

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.82.248.59:443

54.39.98.141:6602

103.109.247.8:10443

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_6d3060121da88f419f2ca61a538b2739857770a82e2b25abebfb60f4150cab4f

    • Size

      188KB

    • MD5

      ca41242f8d5b4ea0e6e7c27ac5986c8b

    • SHA1

      2fda20eb1588b4c75330d2ddcdad129d4bac479c

    • SHA256

      6d3060121da88f419f2ca61a538b2739857770a82e2b25abebfb60f4150cab4f

    • SHA512

      a99c03d4f300b0828ca6172753495b53b79c05630765b78924355c42bcd6d6c8806b322baf572c9162e3fb2a92a95380552f67d31347a99f2ce83ba150785190

    • SSDEEP

      3072:DA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAogo:DzIqATVfQeV2FZalKq6jtGJWuTmd

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks