General

  • Target

    JaffaCakes118_7e07648e69bf14f09cb79538a47c34a70801bc10d82ced018eef0534903d9923

  • Size

    161KB

  • Sample

    241225-b7g7tstnem

  • MD5

    c80ce32a68a2eae886f73080f2c86c0a

  • SHA1

    95915cd231977a1cc2271c7d726211f6264b00ca

  • SHA256

    7e07648e69bf14f09cb79538a47c34a70801bc10d82ced018eef0534903d9923

  • SHA512

    0834c2d60f44a89fbd186d426a57358eaeccd22b7a30458ee805f0487f152584d07f0b5ab668b65b86dc265af90f625c352697f34f157ee1ed35d1d10b1124cc

  • SSDEEP

    3072:KlSuywe6x1ACSZEuNtV+TkqDXkyzbMeJRL3CNa/U9fStrveyk8TZgEd28GkFY:4nS62Fl+pkeJl3CvRStrFl+EYN

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

78.46.73.125:443

185.148.168.26:2303

66.113.160.126:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_7e07648e69bf14f09cb79538a47c34a70801bc10d82ced018eef0534903d9923

    • Size

      161KB

    • MD5

      c80ce32a68a2eae886f73080f2c86c0a

    • SHA1

      95915cd231977a1cc2271c7d726211f6264b00ca

    • SHA256

      7e07648e69bf14f09cb79538a47c34a70801bc10d82ced018eef0534903d9923

    • SHA512

      0834c2d60f44a89fbd186d426a57358eaeccd22b7a30458ee805f0487f152584d07f0b5ab668b65b86dc265af90f625c352697f34f157ee1ed35d1d10b1124cc

    • SSDEEP

      3072:KlSuywe6x1ACSZEuNtV+TkqDXkyzbMeJRL3CNa/U9fStrveyk8TZgEd28GkFY:4nS62Fl+pkeJl3CvRStrFl+EYN

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks