General

  • Target

    JaffaCakes118_56d8d71e118cd54e7bf943dd4aeefb7aee21fac9dc18dbb9543e17225a405204

  • Size

    188KB

  • Sample

    241230-zmbrba1kez

  • MD5

    ec0d489f477d6a40418285d1464bfa79

  • SHA1

    ffd427b27c89d4807d992824ea9d44f3459133bc

  • SHA256

    56d8d71e118cd54e7bf943dd4aeefb7aee21fac9dc18dbb9543e17225a405204

  • SHA512

    c660ad941840256f52b6bd9da043faa153aed5dcb51c5f540271e979c9db1570f05cec4a59401b5730dda190b8364329a8676c44eefa96e1ddd61d7f86fe8be3

  • SSDEEP

    3072:mA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAoto:mzIqATVfQeV2FZalKq6jtGJWuTmd

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.82.248.59:443

54.39.98.141:6602

103.109.247.8:10443

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_56d8d71e118cd54e7bf943dd4aeefb7aee21fac9dc18dbb9543e17225a405204

    • Size

      188KB

    • MD5

      ec0d489f477d6a40418285d1464bfa79

    • SHA1

      ffd427b27c89d4807d992824ea9d44f3459133bc

    • SHA256

      56d8d71e118cd54e7bf943dd4aeefb7aee21fac9dc18dbb9543e17225a405204

    • SHA512

      c660ad941840256f52b6bd9da043faa153aed5dcb51c5f540271e979c9db1570f05cec4a59401b5730dda190b8364329a8676c44eefa96e1ddd61d7f86fe8be3

    • SSDEEP

      3072:mA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAoto:mzIqATVfQeV2FZalKq6jtGJWuTmd

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks