General

  • Target

    JaffaCakes118_f23c511a4dfc39cb012f58f2ecb9e4d760cf0f4533ba4c8bd66e7a802d43a152

  • Size

    161KB

  • Sample

    241221-wqf9esvqbt

  • MD5

    603904b94e593a2b0b15d59e4e65bd28

  • SHA1

    8c6724f2d7b706aca9b351749af202432cd119c6

  • SHA256

    f23c511a4dfc39cb012f58f2ecb9e4d760cf0f4533ba4c8bd66e7a802d43a152

  • SHA512

    37eb5b3ebe087bc915af0699f80ca30993e4bd7cb68121b88d799b59645b693d5b9311dc7a7c51577f7998b66a8ff56a4c20a4c5e3f51c10885e17b35251c198

  • SSDEEP

    3072:cgSuywe6x1ACSZEuNtV+TkqDXkyzbMeJRL3CNa/U9fStrveyk8TZgEd2ZGkFY:7nS62Fl+pkeJl3CvRStrFl+EYM

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

78.46.73.125:443

185.148.168.26:2303

66.113.160.126:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_f23c511a4dfc39cb012f58f2ecb9e4d760cf0f4533ba4c8bd66e7a802d43a152

    • Size

      161KB

    • MD5

      603904b94e593a2b0b15d59e4e65bd28

    • SHA1

      8c6724f2d7b706aca9b351749af202432cd119c6

    • SHA256

      f23c511a4dfc39cb012f58f2ecb9e4d760cf0f4533ba4c8bd66e7a802d43a152

    • SHA512

      37eb5b3ebe087bc915af0699f80ca30993e4bd7cb68121b88d799b59645b693d5b9311dc7a7c51577f7998b66a8ff56a4c20a4c5e3f51c10885e17b35251c198

    • SSDEEP

      3072:cgSuywe6x1ACSZEuNtV+TkqDXkyzbMeJRL3CNa/U9fStrveyk8TZgEd2ZGkFY:7nS62Fl+pkeJl3CvRStrFl+EYM

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks