General

  • Target

    JaffaCakes118_32fc5c8e5a618119f9a92b36865be61b24cb277502f9c808f28ba48e08c6b73f

  • Size

    161KB

  • Sample

    241225-g9ahnazqcp

  • MD5

    107871ea3307cbd9595d48f2beba8c16

  • SHA1

    3d912a03ac31591edeeecb6a5b185fac81bc9103

  • SHA256

    32fc5c8e5a618119f9a92b36865be61b24cb277502f9c808f28ba48e08c6b73f

  • SHA512

    d2a1a1b0715291f87c0a2fe021161b703ab05204cc85dd9e99acf7cc28acd65c6043623d91c264abdfb42b1811fafb51633b4bd883b9b3b2d14c0d2e5b345162

  • SSDEEP

    3072:2aSuywe6x1ACSZEuNtV+TkqDXkyzbMeJRL3CNa/U9fStrveyk8TZgEd2BGkFY:DnS62Fl+pkeJl3CvRStrFl+EYE

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

78.46.73.125:443

185.148.168.26:2303

66.113.160.126:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_32fc5c8e5a618119f9a92b36865be61b24cb277502f9c808f28ba48e08c6b73f

    • Size

      161KB

    • MD5

      107871ea3307cbd9595d48f2beba8c16

    • SHA1

      3d912a03ac31591edeeecb6a5b185fac81bc9103

    • SHA256

      32fc5c8e5a618119f9a92b36865be61b24cb277502f9c808f28ba48e08c6b73f

    • SHA512

      d2a1a1b0715291f87c0a2fe021161b703ab05204cc85dd9e99acf7cc28acd65c6043623d91c264abdfb42b1811fafb51633b4bd883b9b3b2d14c0d2e5b345162

    • SSDEEP

      3072:2aSuywe6x1ACSZEuNtV+TkqDXkyzbMeJRL3CNa/U9fStrveyk8TZgEd2BGkFY:DnS62Fl+pkeJl3CvRStrFl+EYE

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks