General

  • Target

    JaffaCakes118_59449a960f0e1d493d763230e2084baedc91a54e675cb067b96b224a355b4987

  • Size

    161KB

  • Sample

    241224-pxt1jaxncs

  • MD5

    15f9eb8721c7a91565ce20c53c23b67b

  • SHA1

    f86ac7d23c245bcb78454e0d0aed3e758f7300d7

  • SHA256

    59449a960f0e1d493d763230e2084baedc91a54e675cb067b96b224a355b4987

  • SHA512

    00027fc00e61b77ba8fdfd4734a4f76566de4dc71820ebe195ee1086ce443b190422ea6f851a4d7baffb6783b49b002d8a4a617e699067faee2edece506f45c0

  • SSDEEP

    3072:/tSuywe6x1ACSZEuNtV+TkqDXkyzbMeJRL3CNa/U9fStrveyk8TZgEd2TGkFY:lnS62Fl+pkeJl3CvRStrFl+EYi

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

78.46.73.125:443

185.148.168.26:2303

66.113.160.126:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_59449a960f0e1d493d763230e2084baedc91a54e675cb067b96b224a355b4987

    • Size

      161KB

    • MD5

      15f9eb8721c7a91565ce20c53c23b67b

    • SHA1

      f86ac7d23c245bcb78454e0d0aed3e758f7300d7

    • SHA256

      59449a960f0e1d493d763230e2084baedc91a54e675cb067b96b224a355b4987

    • SHA512

      00027fc00e61b77ba8fdfd4734a4f76566de4dc71820ebe195ee1086ce443b190422ea6f851a4d7baffb6783b49b002d8a4a617e699067faee2edece506f45c0

    • SSDEEP

      3072:/tSuywe6x1ACSZEuNtV+TkqDXkyzbMeJRL3CNa/U9fStrveyk8TZgEd2TGkFY:lnS62Fl+pkeJl3CvRStrFl+EYi

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks