General

  • Target

    JaffaCakes118_cef345d2026256c6c7b8037bcd11dcfacdf5f6a96895b2d2dc3275426fcf55df

  • Size

    188KB

  • Sample

    241230-zv288s1nes

  • MD5

    585bfa15418fa470232fc10c1903aa36

  • SHA1

    271f384d8de7451341449a912acff8a61490a4ab

  • SHA256

    cef345d2026256c6c7b8037bcd11dcfacdf5f6a96895b2d2dc3275426fcf55df

  • SHA512

    053d899485e944d31a6ffcb169c92b2c9aed3854add0e8ab3426dac13056f5c8f379f72fa6a963fd915ea6485ecd71aade466cc17778ac3cdb06080ba49b7bf8

  • SSDEEP

    3072:xA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAowo:xzIqATVfQeV2FZalKq6jtGJWuTmd

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.82.248.59:443

54.39.98.141:6602

103.109.247.8:10443

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_cef345d2026256c6c7b8037bcd11dcfacdf5f6a96895b2d2dc3275426fcf55df

    • Size

      188KB

    • MD5

      585bfa15418fa470232fc10c1903aa36

    • SHA1

      271f384d8de7451341449a912acff8a61490a4ab

    • SHA256

      cef345d2026256c6c7b8037bcd11dcfacdf5f6a96895b2d2dc3275426fcf55df

    • SHA512

      053d899485e944d31a6ffcb169c92b2c9aed3854add0e8ab3426dac13056f5c8f379f72fa6a963fd915ea6485ecd71aade466cc17778ac3cdb06080ba49b7bf8

    • SSDEEP

      3072:xA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAowo:xzIqATVfQeV2FZalKq6jtGJWuTmd

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks