General

  • Target

    JaffaCakes118_c26817e761c86aba91bf5b6f060be54d303b8f0a17f00d66ad1bcef743c5e75b

  • Size

    161KB

  • Sample

    241229-fn5w1atkdp

  • MD5

    fdf417e08dbb91960ed1a5fb69430d64

  • SHA1

    a62b64e58ca5e7a823a1f0a0b55d7c17e1ca4dfd

  • SHA256

    c26817e761c86aba91bf5b6f060be54d303b8f0a17f00d66ad1bcef743c5e75b

  • SHA512

    cd96dfc19fa93c6b82e166506fff0344938e5cc81c599d461fa74f79c3738b48482b06bf890b7c5b2efffbf3535c40e288c3ac16672509af5a5e36608d7f2f57

  • SSDEEP

    3072:S1Suywe6x1ACSZEuNtV+TkqDXkyzbMeJRL3CNa/U9fStrveyk8TZgEd2wGkFY:0nS62Fl+pkeJl3CvRStrFl+EYh

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

78.46.73.125:443

185.148.168.26:2303

66.113.160.126:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_c26817e761c86aba91bf5b6f060be54d303b8f0a17f00d66ad1bcef743c5e75b

    • Size

      161KB

    • MD5

      fdf417e08dbb91960ed1a5fb69430d64

    • SHA1

      a62b64e58ca5e7a823a1f0a0b55d7c17e1ca4dfd

    • SHA256

      c26817e761c86aba91bf5b6f060be54d303b8f0a17f00d66ad1bcef743c5e75b

    • SHA512

      cd96dfc19fa93c6b82e166506fff0344938e5cc81c599d461fa74f79c3738b48482b06bf890b7c5b2efffbf3535c40e288c3ac16672509af5a5e36608d7f2f57

    • SSDEEP

      3072:S1Suywe6x1ACSZEuNtV+TkqDXkyzbMeJRL3CNa/U9fStrveyk8TZgEd2wGkFY:0nS62Fl+pkeJl3CvRStrFl+EYh

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks