General

  • Target

    JaffaCakes118_0072cc6c4205b07a5f4dba14d33078deae2f0b3424987b52e82c7540f941187c

  • Size

    161KB

  • Sample

    241224-dww8qa1jcy

  • MD5

    35869ba908e09fbeabf0453b86a355c8

  • SHA1

    19db8253e0dbd959df58dddf572a348781f2f254

  • SHA256

    0072cc6c4205b07a5f4dba14d33078deae2f0b3424987b52e82c7540f941187c

  • SHA512

    42a330f545687291e80a4c6087718f7c0b435e1c248dc6c0742ebf7f924a7b98ee510af2f042c661f7d33c118769826c4570da1762663fc211bfad03301536c1

  • SSDEEP

    3072:+1Suywe6x1ACSZEuNtV+TkqDXkyzbMeJRL3CNa/U9fStrveyk8TZgEd2wGkFY:AnS62Fl+pkeJl3CvRStrFl+EYh

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

78.46.73.125:443

185.148.168.26:2303

66.113.160.126:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_0072cc6c4205b07a5f4dba14d33078deae2f0b3424987b52e82c7540f941187c

    • Size

      161KB

    • MD5

      35869ba908e09fbeabf0453b86a355c8

    • SHA1

      19db8253e0dbd959df58dddf572a348781f2f254

    • SHA256

      0072cc6c4205b07a5f4dba14d33078deae2f0b3424987b52e82c7540f941187c

    • SHA512

      42a330f545687291e80a4c6087718f7c0b435e1c248dc6c0742ebf7f924a7b98ee510af2f042c661f7d33c118769826c4570da1762663fc211bfad03301536c1

    • SSDEEP

      3072:+1Suywe6x1ACSZEuNtV+TkqDXkyzbMeJRL3CNa/U9fStrveyk8TZgEd2wGkFY:AnS62Fl+pkeJl3CvRStrFl+EYh

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks