General

  • Target

    JaffaCakes118_e07cb66d810e13d3f0b6b5ca0e732385bcee16184dde782f841cc3ee96110869

  • Size

    161KB

  • Sample

    241225-anag7s1qfv

  • MD5

    01346f880e2b33625713868844a9bbfd

  • SHA1

    6bf29e86ceba78954703e8b29b44bfcd62910d87

  • SHA256

    e07cb66d810e13d3f0b6b5ca0e732385bcee16184dde782f841cc3ee96110869

  • SHA512

    df5775e62090ee37c42f986a89f7ab43e87a99e7da17dc79d30e74ea0b7a14af9f2be1876d7f97acc5c522f7f7a04fbdead944215067dc0f127d05ad1d002709

  • SSDEEP

    3072:r1Suywe6x1ACSZEuNtV+TkqDXkyzbMeJRL3CNa/U9fStrveyk8TZgEd2wGkFY:ZnS62Fl+pkeJl3CvRStrFl+EYh

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

78.46.73.125:443

185.148.168.26:2303

66.113.160.126:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_e07cb66d810e13d3f0b6b5ca0e732385bcee16184dde782f841cc3ee96110869

    • Size

      161KB

    • MD5

      01346f880e2b33625713868844a9bbfd

    • SHA1

      6bf29e86ceba78954703e8b29b44bfcd62910d87

    • SHA256

      e07cb66d810e13d3f0b6b5ca0e732385bcee16184dde782f841cc3ee96110869

    • SHA512

      df5775e62090ee37c42f986a89f7ab43e87a99e7da17dc79d30e74ea0b7a14af9f2be1876d7f97acc5c522f7f7a04fbdead944215067dc0f127d05ad1d002709

    • SSDEEP

      3072:r1Suywe6x1ACSZEuNtV+TkqDXkyzbMeJRL3CNa/U9fStrveyk8TZgEd2wGkFY:ZnS62Fl+pkeJl3CvRStrFl+EYh

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks