General

  • Target

    JaffaCakes118_da96e75166b2a728eb73ee15a748776b3ac4f6d04138035cf349a5db6c575a21

  • Size

    161KB

  • Sample

    241229-1xwpxaxrby

  • MD5

    82ad14834aae6683d150a92a47d24c6e

  • SHA1

    27d66e6f46015b48beaf94976ee66874e21d821d

  • SHA256

    da96e75166b2a728eb73ee15a748776b3ac4f6d04138035cf349a5db6c575a21

  • SHA512

    d9c27a8582c45a03c7b27cc9f724d3dbc48054295e31dd3b4c914145136e7e1339c90fdeb5af591fc6fbfff87561f9364df80db4f2352de7cf8f5754d9a06c67

  • SSDEEP

    3072:OnSuywe6x1ACSZEuNtV+TkqDXkyzbMeJRL3CNa/U9fStrveyk8TZgEd2xGkFY:unS62Fl+pkeJl3CvRStrFl+EY0

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

78.46.73.125:443

185.148.168.26:2303

66.113.160.126:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_da96e75166b2a728eb73ee15a748776b3ac4f6d04138035cf349a5db6c575a21

    • Size

      161KB

    • MD5

      82ad14834aae6683d150a92a47d24c6e

    • SHA1

      27d66e6f46015b48beaf94976ee66874e21d821d

    • SHA256

      da96e75166b2a728eb73ee15a748776b3ac4f6d04138035cf349a5db6c575a21

    • SHA512

      d9c27a8582c45a03c7b27cc9f724d3dbc48054295e31dd3b4c914145136e7e1339c90fdeb5af591fc6fbfff87561f9364df80db4f2352de7cf8f5754d9a06c67

    • SSDEEP

      3072:OnSuywe6x1ACSZEuNtV+TkqDXkyzbMeJRL3CNa/U9fStrveyk8TZgEd2xGkFY:unS62Fl+pkeJl3CvRStrFl+EY0

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks