General

  • Target

    JaffaCakes118_bef2c55fdfdccf0e0314e4d268b8be625a6021d4dc1851e57a3711437c818a5d

  • Size

    161KB

  • Sample

    241221-27sxfatjht

  • MD5

    0927d87f17333a27adf929e10ca1934d

  • SHA1

    1db5346edf3ee2cd2c1acd7726141c4c683d73da

  • SHA256

    bef2c55fdfdccf0e0314e4d268b8be625a6021d4dc1851e57a3711437c818a5d

  • SHA512

    d261663ebacd57d6af17d140ba489de9d4d06e92f295a701711c49292192b3aaa3d998d8736cec9eba1b38e852ef7fdaa195d31c582f03b0d38392204ecd0eed

  • SSDEEP

    3072:TaSuywe6x1ACSZEuNtV+TkqDXkyzbMeJRL3CNa/U9fStrveyk8TZgEd2BGkFY:unS62Fl+pkeJl3CvRStrFl+EYE

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

78.46.73.125:443

185.148.168.26:2303

66.113.160.126:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_bef2c55fdfdccf0e0314e4d268b8be625a6021d4dc1851e57a3711437c818a5d

    • Size

      161KB

    • MD5

      0927d87f17333a27adf929e10ca1934d

    • SHA1

      1db5346edf3ee2cd2c1acd7726141c4c683d73da

    • SHA256

      bef2c55fdfdccf0e0314e4d268b8be625a6021d4dc1851e57a3711437c818a5d

    • SHA512

      d261663ebacd57d6af17d140ba489de9d4d06e92f295a701711c49292192b3aaa3d998d8736cec9eba1b38e852ef7fdaa195d31c582f03b0d38392204ecd0eed

    • SSDEEP

      3072:TaSuywe6x1ACSZEuNtV+TkqDXkyzbMeJRL3CNa/U9fStrveyk8TZgEd2BGkFY:unS62Fl+pkeJl3CvRStrFl+EYE

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks