General

  • Target

    JaffaCakes118_7c1c8a156b253bf77c91575127353fc395eca99f2ddb107fb7d81fcec6ee9461

  • Size

    161KB

  • Sample

    241221-x8rzbaxmew

  • MD5

    a8352a6d0506c503b3bf79bfbea2f81c

  • SHA1

    14d22f45989d0a5796bdf11874a19573836d6b75

  • SHA256

    7c1c8a156b253bf77c91575127353fc395eca99f2ddb107fb7d81fcec6ee9461

  • SHA512

    563a9133e6ad44940bc50af5e2c33402b1985228aa592bdde557bc8261c4fdd1fbced72ce49d720af458e9076874dda77ba0f253966113a3dbf19763d6ddab33

  • SSDEEP

    3072:+tSuywe6x1ACSZEuNtV+TkqDXkyzbMeJRL3CNa/U9fStrveyk8TZgEd2TGkFY:4nS62Fl+pkeJl3CvRStrFl+EYi

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

78.46.73.125:443

185.148.168.26:2303

66.113.160.126:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_7c1c8a156b253bf77c91575127353fc395eca99f2ddb107fb7d81fcec6ee9461

    • Size

      161KB

    • MD5

      a8352a6d0506c503b3bf79bfbea2f81c

    • SHA1

      14d22f45989d0a5796bdf11874a19573836d6b75

    • SHA256

      7c1c8a156b253bf77c91575127353fc395eca99f2ddb107fb7d81fcec6ee9461

    • SHA512

      563a9133e6ad44940bc50af5e2c33402b1985228aa592bdde557bc8261c4fdd1fbced72ce49d720af458e9076874dda77ba0f253966113a3dbf19763d6ddab33

    • SSDEEP

      3072:+tSuywe6x1ACSZEuNtV+TkqDXkyzbMeJRL3CNa/U9fStrveyk8TZgEd2TGkFY:4nS62Fl+pkeJl3CvRStrFl+EYi

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks