General

  • Target

    JaffaCakes118_2b59fd7607c17b551a9e6dc5f9b6d15f826c8ec63985f5d477790c39b096fa6a

  • Size

    161KB

  • Sample

    241225-evq6raxqfj

  • MD5

    e63378eceff33cbb4d4fb46eedd29766

  • SHA1

    eb9112c2d690cf94168ad1a68ba97baf471c17c3

  • SHA256

    2b59fd7607c17b551a9e6dc5f9b6d15f826c8ec63985f5d477790c39b096fa6a

  • SHA512

    1fd147dc5cb9adba8427a65c7d91b197a990649aed5d507297ad98f28b7e42f0831ce39443ae4c874330a285c77a3d2a6f6330f89a786827f9ee5aede66e2a47

  • SSDEEP

    3072:PtSuywe6x1ACSZEuNtV+TkqDXkyzbMeJRL3CNa/U9fStrveyk8TZgEd2TGkFY:1nS62Fl+pkeJl3CvRStrFl+EYi

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

78.46.73.125:443

185.148.168.26:2303

66.113.160.126:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_2b59fd7607c17b551a9e6dc5f9b6d15f826c8ec63985f5d477790c39b096fa6a

    • Size

      161KB

    • MD5

      e63378eceff33cbb4d4fb46eedd29766

    • SHA1

      eb9112c2d690cf94168ad1a68ba97baf471c17c3

    • SHA256

      2b59fd7607c17b551a9e6dc5f9b6d15f826c8ec63985f5d477790c39b096fa6a

    • SHA512

      1fd147dc5cb9adba8427a65c7d91b197a990649aed5d507297ad98f28b7e42f0831ce39443ae4c874330a285c77a3d2a6f6330f89a786827f9ee5aede66e2a47

    • SSDEEP

      3072:PtSuywe6x1ACSZEuNtV+TkqDXkyzbMeJRL3CNa/U9fStrveyk8TZgEd2TGkFY:1nS62Fl+pkeJl3CvRStrFl+EYi

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks