General

  • Target

    JaffaCakes118_99cf5687f82c8eddd3988203e6a343a97e8c44fa18bd8094f51f653530c891cb

  • Size

    161KB

  • Sample

    241224-c8n77szlgs

  • MD5

    79c08a3f11cd40e6f5bb143620ae251a

  • SHA1

    b47868d8615f67c6b74054160db912bb3d54d0ea

  • SHA256

    99cf5687f82c8eddd3988203e6a343a97e8c44fa18bd8094f51f653530c891cb

  • SHA512

    b577c5e025b6c385f3dcd0464c5566e17b03439e2a81bbb4ccf83c1048bbc788781220374ada27a17e93c060a67de9b6198c83d6df03a2a97e9e0a84450d3390

  • SSDEEP

    3072:BgSuywe6x1ACSZEuNtV+TkqDXkyzbMeJRL3CNa/U9fStrveyk8TZgEd2ZGkFY:KnS62Fl+pkeJl3CvRStrFl+EYM

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

78.46.73.125:443

185.148.168.26:2303

66.113.160.126:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_99cf5687f82c8eddd3988203e6a343a97e8c44fa18bd8094f51f653530c891cb

    • Size

      161KB

    • MD5

      79c08a3f11cd40e6f5bb143620ae251a

    • SHA1

      b47868d8615f67c6b74054160db912bb3d54d0ea

    • SHA256

      99cf5687f82c8eddd3988203e6a343a97e8c44fa18bd8094f51f653530c891cb

    • SHA512

      b577c5e025b6c385f3dcd0464c5566e17b03439e2a81bbb4ccf83c1048bbc788781220374ada27a17e93c060a67de9b6198c83d6df03a2a97e9e0a84450d3390

    • SSDEEP

      3072:BgSuywe6x1ACSZEuNtV+TkqDXkyzbMeJRL3CNa/U9fStrveyk8TZgEd2ZGkFY:KnS62Fl+pkeJl3CvRStrFl+EYM

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks