General

  • Target

    JaffaCakes118_dec854f0bdc622a7d44f43c8d1532380f908419ff2f4d0b16da75097d34bf308

  • Size

    161KB

  • Sample

    241221-13mdes1mcw

  • MD5

    182f043a8878a083062ed26f474fffbe

  • SHA1

    0db41cf5360b5b92bc7e25fd851382d4451b10cc

  • SHA256

    dec854f0bdc622a7d44f43c8d1532380f908419ff2f4d0b16da75097d34bf308

  • SHA512

    c4028c4c9e4a0c33b7957a3518ea8e0cc0ae21f576372795af3dd83a99c7ccba7ba2f739e4eb54ad26fa7a4be0a1eb76e4834f302199e884af0bb2b2f5fc0de5

  • SSDEEP

    3072:iySuywe6x1ACSZEuNtV+TkqDXkyzbMeJRL3CNa/U9fStrveyk8TZgEd2DGkFY:nnS62Fl+pkeJl3CvRStrFl+EYS

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

78.46.73.125:443

185.148.168.26:2303

66.113.160.126:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_dec854f0bdc622a7d44f43c8d1532380f908419ff2f4d0b16da75097d34bf308

    • Size

      161KB

    • MD5

      182f043a8878a083062ed26f474fffbe

    • SHA1

      0db41cf5360b5b92bc7e25fd851382d4451b10cc

    • SHA256

      dec854f0bdc622a7d44f43c8d1532380f908419ff2f4d0b16da75097d34bf308

    • SHA512

      c4028c4c9e4a0c33b7957a3518ea8e0cc0ae21f576372795af3dd83a99c7ccba7ba2f739e4eb54ad26fa7a4be0a1eb76e4834f302199e884af0bb2b2f5fc0de5

    • SSDEEP

      3072:iySuywe6x1ACSZEuNtV+TkqDXkyzbMeJRL3CNa/U9fStrveyk8TZgEd2DGkFY:nnS62Fl+pkeJl3CvRStrFl+EYS

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks