General

  • Target

    JaffaCakes118_52540b0cd881c960942008caf92ff488f45c035cd377c6c6b0275cf9a1b84a19

  • Size

    161KB

  • Sample

    241228-2aqqtatjgw

  • MD5

    e66115eeae8f72fe715d1ef42c9de795

  • SHA1

    b00fef5fc0c339f8d682eefae8587047d0d86c7e

  • SHA256

    52540b0cd881c960942008caf92ff488f45c035cd377c6c6b0275cf9a1b84a19

  • SHA512

    02ec98f628a7ca1479cc5e886b7460b4e8233550ecf56e268db302480df889b8926c655543024f66f331b08487a997ff6bdaf2ee4265ab89a6f80ed985134f53

  • SSDEEP

    3072:mPSuywe6x1ACSZEuNtV+TkqDXkyzbMeJRL3CNa/U9fStrveyk8TZgEd27GkFY:OnS62Fl+pkeJl3CvRStrFl+EYa

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

78.46.73.125:443

185.148.168.26:2303

66.113.160.126:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_52540b0cd881c960942008caf92ff488f45c035cd377c6c6b0275cf9a1b84a19

    • Size

      161KB

    • MD5

      e66115eeae8f72fe715d1ef42c9de795

    • SHA1

      b00fef5fc0c339f8d682eefae8587047d0d86c7e

    • SHA256

      52540b0cd881c960942008caf92ff488f45c035cd377c6c6b0275cf9a1b84a19

    • SHA512

      02ec98f628a7ca1479cc5e886b7460b4e8233550ecf56e268db302480df889b8926c655543024f66f331b08487a997ff6bdaf2ee4265ab89a6f80ed985134f53

    • SSDEEP

      3072:mPSuywe6x1ACSZEuNtV+TkqDXkyzbMeJRL3CNa/U9fStrveyk8TZgEd27GkFY:OnS62Fl+pkeJl3CvRStrFl+EYa

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks