General

  • Target

    JaffaCakes118_6401df48daa76e97687d90e94772f0119ed802255235849370e3be264ae9672c

  • Size

    161KB

  • Sample

    241225-e67b4sxrgx

  • MD5

    1cf99808cc5edcd81b4f08d72920c7be

  • SHA1

    61e231435f316be0dd7ffbe822f9c80f7c03fc81

  • SHA256

    6401df48daa76e97687d90e94772f0119ed802255235849370e3be264ae9672c

  • SHA512

    4d4add67c0451d35c94c3fa693df13f4ca5915ffdb8fa1222ca1a3c9bb1af26747702cc0207024620c03b13b0f89e96efaac5fb310e1a901187b60ef73fbb65f

  • SSDEEP

    3072:4oSuywe6x1ACSZEuNtV+TkqDXkyzbMeJRL3CNa/U9fStrveyk8TZgEd2aGkFY:nnS62Fl+pkeJl3CvRStrFl+EYn

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

78.46.73.125:443

185.148.168.26:2303

66.113.160.126:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_6401df48daa76e97687d90e94772f0119ed802255235849370e3be264ae9672c

    • Size

      161KB

    • MD5

      1cf99808cc5edcd81b4f08d72920c7be

    • SHA1

      61e231435f316be0dd7ffbe822f9c80f7c03fc81

    • SHA256

      6401df48daa76e97687d90e94772f0119ed802255235849370e3be264ae9672c

    • SHA512

      4d4add67c0451d35c94c3fa693df13f4ca5915ffdb8fa1222ca1a3c9bb1af26747702cc0207024620c03b13b0f89e96efaac5fb310e1a901187b60ef73fbb65f

    • SSDEEP

      3072:4oSuywe6x1ACSZEuNtV+TkqDXkyzbMeJRL3CNa/U9fStrveyk8TZgEd2aGkFY:nnS62Fl+pkeJl3CvRStrFl+EYn

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks