General

  • Target

    JaffaCakes118_47bf018d9d288471391c8162a9a1cb23aada0a26c09396ec68c6e24113ee4d81

  • Size

    161KB

  • Sample

    241227-b33b7sykf1

  • MD5

    2a74f8de656e58db44d031afce3f6f0b

  • SHA1

    83bac82c1a28c8641f3db64baaac41ad296999bf

  • SHA256

    47bf018d9d288471391c8162a9a1cb23aada0a26c09396ec68c6e24113ee4d81

  • SHA512

    692ee6c5fdade0fc54fe4c80f0c37090a865fbb572d142b535e5f109652a4a6aa057c41eff067152794e5a85a81e9d3527a42f57b2671bce307ab3fbb53b5892

  • SSDEEP

    3072:vgSuywe6x1ACSZEuNtV+TkqDXkyzbMeJRL3CNa/U9fStrveyk8TZgEd2ZGkFY:InS62Fl+pkeJl3CvRStrFl+EYM

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

78.46.73.125:443

185.148.168.26:2303

66.113.160.126:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_47bf018d9d288471391c8162a9a1cb23aada0a26c09396ec68c6e24113ee4d81

    • Size

      161KB

    • MD5

      2a74f8de656e58db44d031afce3f6f0b

    • SHA1

      83bac82c1a28c8641f3db64baaac41ad296999bf

    • SHA256

      47bf018d9d288471391c8162a9a1cb23aada0a26c09396ec68c6e24113ee4d81

    • SHA512

      692ee6c5fdade0fc54fe4c80f0c37090a865fbb572d142b535e5f109652a4a6aa057c41eff067152794e5a85a81e9d3527a42f57b2671bce307ab3fbb53b5892

    • SSDEEP

      3072:vgSuywe6x1ACSZEuNtV+TkqDXkyzbMeJRL3CNa/U9fStrveyk8TZgEd2ZGkFY:InS62Fl+pkeJl3CvRStrFl+EYM

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks