General

  • Target

    JaffaCakes118_3dc9cb7703bbf6a907da0710c85e0a89aef5745e3c6ee59722c05f9301477aa0

  • Size

    161KB

  • Sample

    241229-exewhasmbw

  • MD5

    1d96e47ad5809def7c78e736a1ed81bc

  • SHA1

    0d8bdc59f8e2f1cf615b9d446530c63942092597

  • SHA256

    3dc9cb7703bbf6a907da0710c85e0a89aef5745e3c6ee59722c05f9301477aa0

  • SHA512

    ab18cf9951b8e5a1c8d72c767d5ee9bdd6e509596a116b53cea032cad94450496d20efe6253e5e2f066b2013d7b71d987f815ed72c00417949455150501e04ad

  • SSDEEP

    3072:IaSuywe6x1ACSZEuNtV+TkqDXkyzbMeJRL3CNa/U9fStrveyk8TZgEd2BGkFY:FnS62Fl+pkeJl3CvRStrFl+EYE

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

78.46.73.125:443

185.148.168.26:2303

66.113.160.126:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_3dc9cb7703bbf6a907da0710c85e0a89aef5745e3c6ee59722c05f9301477aa0

    • Size

      161KB

    • MD5

      1d96e47ad5809def7c78e736a1ed81bc

    • SHA1

      0d8bdc59f8e2f1cf615b9d446530c63942092597

    • SHA256

      3dc9cb7703bbf6a907da0710c85e0a89aef5745e3c6ee59722c05f9301477aa0

    • SHA512

      ab18cf9951b8e5a1c8d72c767d5ee9bdd6e509596a116b53cea032cad94450496d20efe6253e5e2f066b2013d7b71d987f815ed72c00417949455150501e04ad

    • SSDEEP

      3072:IaSuywe6x1ACSZEuNtV+TkqDXkyzbMeJRL3CNa/U9fStrveyk8TZgEd2BGkFY:FnS62Fl+pkeJl3CvRStrFl+EYE

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks