General

  • Target

    JaffaCakes118_e14a8f2d34a7f68e0f8fb91bcc027c49933203ee603ef325f1dd8fe286becccf

  • Size

    161KB

  • Sample

    241224-lrglgatqfx

  • MD5

    0ed8be12253ac84badce6c5191151271

  • SHA1

    cf266aa0528b7089996abb42a5355c145aea6b22

  • SHA256

    e14a8f2d34a7f68e0f8fb91bcc027c49933203ee603ef325f1dd8fe286becccf

  • SHA512

    37e34a4ec1ff01a33f2545c8fa3d9edcb1edcc6dd3dfbba317e7520f61c593f8806bc4e13f4ad7a40e3d51c8f579fb017f24085f6d78e9858ea6b4e5eb7f2f75

  • SSDEEP

    3072:z1Suywe6x1ACSZEuNtV+TkqDXkyzbMeJRL3CNa/U9fStrveyk8TZgEd2wGkFY:BnS62Fl+pkeJl3CvRStrFl+EYh

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

78.46.73.125:443

185.148.168.26:2303

66.113.160.126:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_e14a8f2d34a7f68e0f8fb91bcc027c49933203ee603ef325f1dd8fe286becccf

    • Size

      161KB

    • MD5

      0ed8be12253ac84badce6c5191151271

    • SHA1

      cf266aa0528b7089996abb42a5355c145aea6b22

    • SHA256

      e14a8f2d34a7f68e0f8fb91bcc027c49933203ee603ef325f1dd8fe286becccf

    • SHA512

      37e34a4ec1ff01a33f2545c8fa3d9edcb1edcc6dd3dfbba317e7520f61c593f8806bc4e13f4ad7a40e3d51c8f579fb017f24085f6d78e9858ea6b4e5eb7f2f75

    • SSDEEP

      3072:z1Suywe6x1ACSZEuNtV+TkqDXkyzbMeJRL3CNa/U9fStrveyk8TZgEd2wGkFY:BnS62Fl+pkeJl3CvRStrFl+EYh

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks