General

  • Target

    JaffaCakes118_43e4ce9d2a5d999a4f1a10ea28f7197ccb3c42a03496cb4b1ed61c43a822ef47

  • Size

    161KB

  • Sample

    241221-3hpddstna1

  • MD5

    7a4c0f6c11c6935c0793003fb7d9dcd4

  • SHA1

    a6bb0ad4392f7e6e23a4f35f7e5d8f921f5912f9

  • SHA256

    43e4ce9d2a5d999a4f1a10ea28f7197ccb3c42a03496cb4b1ed61c43a822ef47

  • SHA512

    2044f157bcc7ce5b16da55757f78d7fe560da27c3a850b59b438ac0cd9b2aab0bce25fddccfb1df7f27523029cf6ca01b5dbf84170bbf105ee2470db74ea912e

  • SSDEEP

    3072:1tSuywe6x1ACSZEuNtV+TkqDXkyzbMeJRL3CNa/U9fStrveyk8TZgEd2TGkFY:vnS62Fl+pkeJl3CvRStrFl+EYi

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

78.46.73.125:443

185.148.168.26:2303

66.113.160.126:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_43e4ce9d2a5d999a4f1a10ea28f7197ccb3c42a03496cb4b1ed61c43a822ef47

    • Size

      161KB

    • MD5

      7a4c0f6c11c6935c0793003fb7d9dcd4

    • SHA1

      a6bb0ad4392f7e6e23a4f35f7e5d8f921f5912f9

    • SHA256

      43e4ce9d2a5d999a4f1a10ea28f7197ccb3c42a03496cb4b1ed61c43a822ef47

    • SHA512

      2044f157bcc7ce5b16da55757f78d7fe560da27c3a850b59b438ac0cd9b2aab0bce25fddccfb1df7f27523029cf6ca01b5dbf84170bbf105ee2470db74ea912e

    • SSDEEP

      3072:1tSuywe6x1ACSZEuNtV+TkqDXkyzbMeJRL3CNa/U9fStrveyk8TZgEd2TGkFY:vnS62Fl+pkeJl3CvRStrFl+EYi

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks