General

  • Target

    JaffaCakes118_41ebfd6fcc31dfa8b2f74150dd894d2a93f6518ab5d86a48f0db660a44b0e4eb

  • Size

    161KB

  • Sample

    241224-aagz5awlbp

  • MD5

    0b336537a52e431cc9d94bf77c9172e9

  • SHA1

    8d5c2bf4cb36bb9619912ab32ddda0dee94f7dae

  • SHA256

    41ebfd6fcc31dfa8b2f74150dd894d2a93f6518ab5d86a48f0db660a44b0e4eb

  • SHA512

    7340362435ccf3b5207b73e70d9e9582b4664b8fe9cd6b3dfb5950509c2db6d54af9f79f00b9985f4c1aa5c51130a90ada74d2f4c21627e350811e97949da5c4

  • SSDEEP

    3072:ytSuywe6x1ACSZEuNtV+TkqDXkyzbMeJRL3CNa/U9fStrveyk8TZgEd2TGkFY:8nS62Fl+pkeJl3CvRStrFl+EYi

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

78.46.73.125:443

185.148.168.26:2303

66.113.160.126:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_41ebfd6fcc31dfa8b2f74150dd894d2a93f6518ab5d86a48f0db660a44b0e4eb

    • Size

      161KB

    • MD5

      0b336537a52e431cc9d94bf77c9172e9

    • SHA1

      8d5c2bf4cb36bb9619912ab32ddda0dee94f7dae

    • SHA256

      41ebfd6fcc31dfa8b2f74150dd894d2a93f6518ab5d86a48f0db660a44b0e4eb

    • SHA512

      7340362435ccf3b5207b73e70d9e9582b4664b8fe9cd6b3dfb5950509c2db6d54af9f79f00b9985f4c1aa5c51130a90ada74d2f4c21627e350811e97949da5c4

    • SSDEEP

      3072:ytSuywe6x1ACSZEuNtV+TkqDXkyzbMeJRL3CNa/U9fStrveyk8TZgEd2TGkFY:8nS62Fl+pkeJl3CvRStrFl+EYi

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks