General

  • Target

    JaffaCakes118_45fb0b0bce448483d84ec61fe9fc9e1bd52cd050f3b54fee9495a063d3222c1e

  • Size

    161KB

  • Sample

    241224-y6d54swqcl

  • MD5

    6f4437ff887a7ec3dc43fc57d1421ae9

  • SHA1

    06d1c4b72d6362e34452ed62e76363f9c02610f7

  • SHA256

    45fb0b0bce448483d84ec61fe9fc9e1bd52cd050f3b54fee9495a063d3222c1e

  • SHA512

    8d4eed50b191b1831f7593a8f70308a1892e00c0afbe068053d8f2cd2bb7e0f40af1921fb1e71ebbd809598d4667bcf09d250dc8d2b253ba5c027fdc7839053f

  • SSDEEP

    3072:JtSuywe6x1ACSZEuNtV+TkqDXkyzbMeJRL3CNa/U9fStrveyk8TZgEd2TGkFY:DnS62Fl+pkeJl3CvRStrFl+EYi

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

78.46.73.125:443

185.148.168.26:2303

66.113.160.126:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_45fb0b0bce448483d84ec61fe9fc9e1bd52cd050f3b54fee9495a063d3222c1e

    • Size

      161KB

    • MD5

      6f4437ff887a7ec3dc43fc57d1421ae9

    • SHA1

      06d1c4b72d6362e34452ed62e76363f9c02610f7

    • SHA256

      45fb0b0bce448483d84ec61fe9fc9e1bd52cd050f3b54fee9495a063d3222c1e

    • SHA512

      8d4eed50b191b1831f7593a8f70308a1892e00c0afbe068053d8f2cd2bb7e0f40af1921fb1e71ebbd809598d4667bcf09d250dc8d2b253ba5c027fdc7839053f

    • SSDEEP

      3072:JtSuywe6x1ACSZEuNtV+TkqDXkyzbMeJRL3CNa/U9fStrveyk8TZgEd2TGkFY:DnS62Fl+pkeJl3CvRStrFl+EYi

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks