General

  • Target

    JaffaCakes118_1b8def34e23e202898dcebf5f1c6c0ef63af3bbaf30a4a75f77ee09ad8d76211

  • Size

    161KB

  • Sample

    241229-rewgratjfw

  • MD5

    1e09499d9fe20169112b2b7677825cb2

  • SHA1

    161ea38b72d146c6cfda23971c12fcc89fb24c7b

  • SHA256

    1b8def34e23e202898dcebf5f1c6c0ef63af3bbaf30a4a75f77ee09ad8d76211

  • SHA512

    9cf4cb5eb5fdb8289cba2fb80f6165b19007eb1f939645f725612de4b288d2327b7eef556da0c658e0036d5e0ddf8ee79219244d0facfe4f71f9ef3eda528aff

  • SSDEEP

    3072:waSuywe6x1ACSZEuNtV+TkqDXkyzbMeJRL3CNa/U9fStrveyk8TZgEd2BGkFY:9nS62Fl+pkeJl3CvRStrFl+EYE

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

78.46.73.125:443

185.148.168.26:2303

66.113.160.126:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_1b8def34e23e202898dcebf5f1c6c0ef63af3bbaf30a4a75f77ee09ad8d76211

    • Size

      161KB

    • MD5

      1e09499d9fe20169112b2b7677825cb2

    • SHA1

      161ea38b72d146c6cfda23971c12fcc89fb24c7b

    • SHA256

      1b8def34e23e202898dcebf5f1c6c0ef63af3bbaf30a4a75f77ee09ad8d76211

    • SHA512

      9cf4cb5eb5fdb8289cba2fb80f6165b19007eb1f939645f725612de4b288d2327b7eef556da0c658e0036d5e0ddf8ee79219244d0facfe4f71f9ef3eda528aff

    • SSDEEP

      3072:waSuywe6x1ACSZEuNtV+TkqDXkyzbMeJRL3CNa/U9fStrveyk8TZgEd2BGkFY:9nS62Fl+pkeJl3CvRStrFl+EYE

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks