General

  • Target

    JaffaCakes118_ec621cf845324476d79a7d3d83d3f9d8fae2aa778c167c06bf016d6b1b64a8e8

  • Size

    161KB

  • Sample

    241225-sk8jyawmfz

  • MD5

    2b90846180b13432c3e508bfe8b07f29

  • SHA1

    7a7b2565e1bf39f32f5fc035557ecd39095b871c

  • SHA256

    ec621cf845324476d79a7d3d83d3f9d8fae2aa778c167c06bf016d6b1b64a8e8

  • SHA512

    7ce00852b83130ee33152db0bab0a96c64cec8cffb8d00ed7f57d292971b8a2189482931e7419440c46fc829effa1ef2161a2de8363ed125d32d6e675828e3b4

  • SSDEEP

    3072:CaSuywe6x1ACSZEuNtV+TkqDXkyzbMeJRL3CNa/U9fStrveyk8TZgEd2BGkFY:nnS62Fl+pkeJl3CvRStrFl+EYE

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

78.46.73.125:443

185.148.168.26:2303

66.113.160.126:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_ec621cf845324476d79a7d3d83d3f9d8fae2aa778c167c06bf016d6b1b64a8e8

    • Size

      161KB

    • MD5

      2b90846180b13432c3e508bfe8b07f29

    • SHA1

      7a7b2565e1bf39f32f5fc035557ecd39095b871c

    • SHA256

      ec621cf845324476d79a7d3d83d3f9d8fae2aa778c167c06bf016d6b1b64a8e8

    • SHA512

      7ce00852b83130ee33152db0bab0a96c64cec8cffb8d00ed7f57d292971b8a2189482931e7419440c46fc829effa1ef2161a2de8363ed125d32d6e675828e3b4

    • SSDEEP

      3072:CaSuywe6x1ACSZEuNtV+TkqDXkyzbMeJRL3CNa/U9fStrveyk8TZgEd2BGkFY:nnS62Fl+pkeJl3CvRStrFl+EYE

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks