General

  • Target

    JaffaCakes118_c077a8bab5318dc459c82c88c8762744b69ba68ad003a682593b19883321f51a

  • Size

    161KB

  • Sample

    241222-1d8v5azkhs

  • MD5

    9eaf054f4d3e2c2b2b7946aca41fc111

  • SHA1

    7dc2176c32da06a6dc3a5c52ed908d67a7eb5c46

  • SHA256

    c077a8bab5318dc459c82c88c8762744b69ba68ad003a682593b19883321f51a

  • SHA512

    31da45fb0c02d0445f07ca986ec141a5ba737b1679341efdd1f99f08534bbf8d5df710090f844bf9e3a069f2778616dbd3efd204c2885f3085420cfcdf97a075

  • SSDEEP

    3072:itSuywe6x1ACSZEuNtV+TkqDXkyzbMeJRL3CNa/U9fStrveyk8TZgEd2TGkFY:snS62Fl+pkeJl3CvRStrFl+EYi

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

78.46.73.125:443

185.148.168.26:2303

66.113.160.126:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_c077a8bab5318dc459c82c88c8762744b69ba68ad003a682593b19883321f51a

    • Size

      161KB

    • MD5

      9eaf054f4d3e2c2b2b7946aca41fc111

    • SHA1

      7dc2176c32da06a6dc3a5c52ed908d67a7eb5c46

    • SHA256

      c077a8bab5318dc459c82c88c8762744b69ba68ad003a682593b19883321f51a

    • SHA512

      31da45fb0c02d0445f07ca986ec141a5ba737b1679341efdd1f99f08534bbf8d5df710090f844bf9e3a069f2778616dbd3efd204c2885f3085420cfcdf97a075

    • SSDEEP

      3072:itSuywe6x1ACSZEuNtV+TkqDXkyzbMeJRL3CNa/U9fStrveyk8TZgEd2TGkFY:snS62Fl+pkeJl3CvRStrFl+EYi

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks