General

  • Target

    JaffaCakes118_57736435c5543a4572da9cc641328972323653e240e87d3ceca6f063597794ea

  • Size

    161KB

  • Sample

    241221-12khfa1lhw

  • MD5

    da796c3032768301eaf28f83bf6bf986

  • SHA1

    92c3ec9c141b4ef84a3203734eaeb4ad892f20cf

  • SHA256

    57736435c5543a4572da9cc641328972323653e240e87d3ceca6f063597794ea

  • SHA512

    dead627c3a8116f374c317cb80e82c89988088d34e147cae6dd6507fa01fdf291e6d6474d57af5fcdedd49d350495a054ce90b09b5f115c2b9c9c70020b5f6b1

  • SSDEEP

    3072:TgSuywe6x1ACSZEuNtV+TkqDXkyzbMeJRL3CNa/U9fStrveyk8TZgEd2ZGkFY:0nS62Fl+pkeJl3CvRStrFl+EYM

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

78.46.73.125:443

185.148.168.26:2303

66.113.160.126:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_57736435c5543a4572da9cc641328972323653e240e87d3ceca6f063597794ea

    • Size

      161KB

    • MD5

      da796c3032768301eaf28f83bf6bf986

    • SHA1

      92c3ec9c141b4ef84a3203734eaeb4ad892f20cf

    • SHA256

      57736435c5543a4572da9cc641328972323653e240e87d3ceca6f063597794ea

    • SHA512

      dead627c3a8116f374c317cb80e82c89988088d34e147cae6dd6507fa01fdf291e6d6474d57af5fcdedd49d350495a054ce90b09b5f115c2b9c9c70020b5f6b1

    • SSDEEP

      3072:TgSuywe6x1ACSZEuNtV+TkqDXkyzbMeJRL3CNa/U9fStrveyk8TZgEd2ZGkFY:0nS62Fl+pkeJl3CvRStrFl+EYM

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks