General

  • Target

    JaffaCakes118_6fd222a1879a5552cc5e381907bfc3740dbc6b2192224d2e21b9568896a8a275

  • Size

    161KB

  • Sample

    241223-rbpj2a1pdy

  • MD5

    4c5a3ea91fd708f94a3d48f073647ea0

  • SHA1

    25f11f9fa558085c920e99c046c1f03693777134

  • SHA256

    6fd222a1879a5552cc5e381907bfc3740dbc6b2192224d2e21b9568896a8a275

  • SHA512

    7bfc0f19f9b336cf16659c925e175ca2e117c50b72923800727145292c8b64a185c99804e52e03db43f5ac2f096b96d4327dadba7880962135b6c03f88e56786

  • SSDEEP

    3072:oOSuywe6x1ACSZEuNtV+TkqDXkyzbMeJRL3CNa/U9fStrveyk8TZgEd2uGkFY:JnS62Fl+pkeJl3CvRStrFl+EYL

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

78.46.73.125:443

185.148.168.26:2303

66.113.160.126:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_6fd222a1879a5552cc5e381907bfc3740dbc6b2192224d2e21b9568896a8a275

    • Size

      161KB

    • MD5

      4c5a3ea91fd708f94a3d48f073647ea0

    • SHA1

      25f11f9fa558085c920e99c046c1f03693777134

    • SHA256

      6fd222a1879a5552cc5e381907bfc3740dbc6b2192224d2e21b9568896a8a275

    • SHA512

      7bfc0f19f9b336cf16659c925e175ca2e117c50b72923800727145292c8b64a185c99804e52e03db43f5ac2f096b96d4327dadba7880962135b6c03f88e56786

    • SSDEEP

      3072:oOSuywe6x1ACSZEuNtV+TkqDXkyzbMeJRL3CNa/U9fStrveyk8TZgEd2uGkFY:JnS62Fl+pkeJl3CvRStrFl+EYL

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks