General

  • Target

    JaffaCakes118_4bc6a5c2453cf432a5ee8d51368af6e3f87c82cdd09512294662cd00d4856db4

  • Size

    161KB

  • Sample

    241223-skzxsssrhk

  • MD5

    87ee2637f2bb7a96cd7f40e4e9b32c91

  • SHA1

    89d09a2e21e9d4456fb60d73f8a407c4527b9841

  • SHA256

    4bc6a5c2453cf432a5ee8d51368af6e3f87c82cdd09512294662cd00d4856db4

  • SHA512

    46de54b10593acaa69313a8aa68524a7753242ae122255d0c7daa1cf67e5a9dbe1be76c153f670518624d32383887550dbcb61b2ab9f2c9a5e72ea12197cb9e5

  • SSDEEP

    3072:YtSuywe6x1ACSZEuNtV+TkqDXkyzbMeJRL3CNa/U9fStrveyk8TZgEd2TGkFY:2nS62Fl+pkeJl3CvRStrFl+EYi

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

78.46.73.125:443

185.148.168.26:2303

66.113.160.126:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_4bc6a5c2453cf432a5ee8d51368af6e3f87c82cdd09512294662cd00d4856db4

    • Size

      161KB

    • MD5

      87ee2637f2bb7a96cd7f40e4e9b32c91

    • SHA1

      89d09a2e21e9d4456fb60d73f8a407c4527b9841

    • SHA256

      4bc6a5c2453cf432a5ee8d51368af6e3f87c82cdd09512294662cd00d4856db4

    • SHA512

      46de54b10593acaa69313a8aa68524a7753242ae122255d0c7daa1cf67e5a9dbe1be76c153f670518624d32383887550dbcb61b2ab9f2c9a5e72ea12197cb9e5

    • SSDEEP

      3072:YtSuywe6x1ACSZEuNtV+TkqDXkyzbMeJRL3CNa/U9fStrveyk8TZgEd2TGkFY:2nS62Fl+pkeJl3CvRStrFl+EYi

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks