General

  • Target

    JaffaCakes118_13ede9201cb0d75cee37b51581e36a07b684491918ed4e9b10bb8023f0a3d1b5

  • Size

    161KB

  • Sample

    241225-blx16asrhk

  • MD5

    7759e5fb39e475f55c4ac1de4a4dbc8c

  • SHA1

    db53d5f06bf4e3545f8d0f39b60addfe95665cb8

  • SHA256

    13ede9201cb0d75cee37b51581e36a07b684491918ed4e9b10bb8023f0a3d1b5

  • SHA512

    16a9e82a74ebe9eb0d0af8e0bded6ef12d23bd903dd172e2556e7c6e81dcef25994455ede497f6de0e11e86aa265da42a98a6226bc4d0354d1045a8ff939e703

  • SSDEEP

    3072:ljSuywe6x1ACSZEuNtV+TkqDXkyzbMeJRL3CNa/U9fStrveyk8TZgEd28GkFY:tnS62Fl+pkeJl3CvRStrFl+EYN

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

78.46.73.125:443

185.148.168.26:2303

66.113.160.126:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_13ede9201cb0d75cee37b51581e36a07b684491918ed4e9b10bb8023f0a3d1b5

    • Size

      161KB

    • MD5

      7759e5fb39e475f55c4ac1de4a4dbc8c

    • SHA1

      db53d5f06bf4e3545f8d0f39b60addfe95665cb8

    • SHA256

      13ede9201cb0d75cee37b51581e36a07b684491918ed4e9b10bb8023f0a3d1b5

    • SHA512

      16a9e82a74ebe9eb0d0af8e0bded6ef12d23bd903dd172e2556e7c6e81dcef25994455ede497f6de0e11e86aa265da42a98a6226bc4d0354d1045a8ff939e703

    • SSDEEP

      3072:ljSuywe6x1ACSZEuNtV+TkqDXkyzbMeJRL3CNa/U9fStrveyk8TZgEd28GkFY:tnS62Fl+pkeJl3CvRStrFl+EYN

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks