General

  • Target

    JaffaCakes118_e96b8d79a1386c44589abcb503c751975dcc1a529756f514e0c2f649d6d7336c

  • Size

    161KB

  • Sample

    241229-cmfnyayrdq

  • MD5

    9b6d6d0e5a626ba922e12e4c67137cf1

  • SHA1

    997cde8a0e848f4c126d0c40f600349c4e2dabe6

  • SHA256

    e96b8d79a1386c44589abcb503c751975dcc1a529756f514e0c2f649d6d7336c

  • SHA512

    9c061894b19de06ed92a7f098b37cd2d3a631b9772b52336e2c52f5316e544edab2f9cf12166c518c1dcb47848c470e380f8c55ead88a801265116fdb11c2dd1

  • SSDEEP

    3072:ynSuywe6x1ACSZEuNtV+TkqDXkyzbMeJRL3CNa/U9fStrveyk8TZgEd2xGkFY:KnS62Fl+pkeJl3CvRStrFl+EY0

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

78.46.73.125:443

185.148.168.26:2303

66.113.160.126:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_e96b8d79a1386c44589abcb503c751975dcc1a529756f514e0c2f649d6d7336c

    • Size

      161KB

    • MD5

      9b6d6d0e5a626ba922e12e4c67137cf1

    • SHA1

      997cde8a0e848f4c126d0c40f600349c4e2dabe6

    • SHA256

      e96b8d79a1386c44589abcb503c751975dcc1a529756f514e0c2f649d6d7336c

    • SHA512

      9c061894b19de06ed92a7f098b37cd2d3a631b9772b52336e2c52f5316e544edab2f9cf12166c518c1dcb47848c470e380f8c55ead88a801265116fdb11c2dd1

    • SSDEEP

      3072:ynSuywe6x1ACSZEuNtV+TkqDXkyzbMeJRL3CNa/U9fStrveyk8TZgEd2xGkFY:KnS62Fl+pkeJl3CvRStrFl+EY0

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks