General

  • Target

    JaffaCakes118_d41f0f14453cbcbd658848619df6b519621c13dd0a3a6d823f88f0462604e1c0

  • Size

    161KB

  • Sample

    241223-xfp91sxnhn

  • MD5

    feb4e46729ff1a1f471e43b211df7124

  • SHA1

    3914fbe2117b5db1bb18b032efc17e3fd5a1edf8

  • SHA256

    d41f0f14453cbcbd658848619df6b519621c13dd0a3a6d823f88f0462604e1c0

  • SHA512

    75396b3381de3eec0eaecdbc768ac39db0046088e8bcb0d585dd2f594908417818e086f78a42d30c803e057ad873faf610acbc9a0df710afaee4ff1485fc2910

  • SSDEEP

    3072:W1Suywe6x1ACSZEuNtV+TkqDXkyzbMeJRL3CNa/U9fStrveyk8TZgEd2HGkFY:YnS62Fl+pkeJl3CvRStrFl+EYm

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

78.46.73.125:443

185.148.168.26:2303

66.113.160.126:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_d41f0f14453cbcbd658848619df6b519621c13dd0a3a6d823f88f0462604e1c0

    • Size

      161KB

    • MD5

      feb4e46729ff1a1f471e43b211df7124

    • SHA1

      3914fbe2117b5db1bb18b032efc17e3fd5a1edf8

    • SHA256

      d41f0f14453cbcbd658848619df6b519621c13dd0a3a6d823f88f0462604e1c0

    • SHA512

      75396b3381de3eec0eaecdbc768ac39db0046088e8bcb0d585dd2f594908417818e086f78a42d30c803e057ad873faf610acbc9a0df710afaee4ff1485fc2910

    • SSDEEP

      3072:W1Suywe6x1ACSZEuNtV+TkqDXkyzbMeJRL3CNa/U9fStrveyk8TZgEd2HGkFY:YnS62Fl+pkeJl3CvRStrFl+EYm

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks