General

  • Target

    JaffaCakes118_c8b386f9b27bd009d590e552f83cabe32b7d6c7bd8ee5646fa9636a78f0a7e10

  • Size

    161KB

  • Sample

    241225-xz1vvstmey

  • MD5

    b1a1c56a6c1e9a05d71c868c219bca35

  • SHA1

    10f7d6546fcadd0aa91345e2e30a602ddc75cbfa

  • SHA256

    c8b386f9b27bd009d590e552f83cabe32b7d6c7bd8ee5646fa9636a78f0a7e10

  • SHA512

    37546900e3e57dc7f3cca267afc26754a4644a108a851af524ff02e17f714e8aa21862cc44cf3d4b91d6922e3009bc7e101b64494bba41e4472cd42d52c2ca2f

  • SSDEEP

    3072:zgSuywe6x1ACSZEuNtV+TkqDXkyzbMeJRL3CNa/U9fStrveyk8TZgEd2ZGkFY:UnS62Fl+pkeJl3CvRStrFl+EYM

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

78.46.73.125:443

185.148.168.26:2303

66.113.160.126:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_c8b386f9b27bd009d590e552f83cabe32b7d6c7bd8ee5646fa9636a78f0a7e10

    • Size

      161KB

    • MD5

      b1a1c56a6c1e9a05d71c868c219bca35

    • SHA1

      10f7d6546fcadd0aa91345e2e30a602ddc75cbfa

    • SHA256

      c8b386f9b27bd009d590e552f83cabe32b7d6c7bd8ee5646fa9636a78f0a7e10

    • SHA512

      37546900e3e57dc7f3cca267afc26754a4644a108a851af524ff02e17f714e8aa21862cc44cf3d4b91d6922e3009bc7e101b64494bba41e4472cd42d52c2ca2f

    • SSDEEP

      3072:zgSuywe6x1ACSZEuNtV+TkqDXkyzbMeJRL3CNa/U9fStrveyk8TZgEd2ZGkFY:UnS62Fl+pkeJl3CvRStrFl+EYM

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks