General

  • Target

    JaffaCakes118_28ebc8ec970763617065a51cee019141fe5f84c4542ed42333ede982294d4ec5

  • Size

    161KB

  • Sample

    241230-e6qdlaykcl

  • MD5

    3bf29b4490602d0f296fe2cc8c417dd4

  • SHA1

    186b4274f308a9e71aea2fe5149baf93ee2c8fa4

  • SHA256

    28ebc8ec970763617065a51cee019141fe5f84c4542ed42333ede982294d4ec5

  • SHA512

    f59ebe57932047bc7e2b46bf3a20cc731f06a561fb66dc76e0eeb86b498c1745ca60116dec49c13cc8b353b715d268c4622d478c5e302e9cb791a9fde93296a7

  • SSDEEP

    3072:+gSuywe6x1ACSZEuNtV+TkqDXkyzbMeJRL3CNa/U9fStrveyk8TZgEd2ZGkFY:tnS62Fl+pkeJl3CvRStrFl+EYM

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

78.46.73.125:443

185.148.168.26:2303

66.113.160.126:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_28ebc8ec970763617065a51cee019141fe5f84c4542ed42333ede982294d4ec5

    • Size

      161KB

    • MD5

      3bf29b4490602d0f296fe2cc8c417dd4

    • SHA1

      186b4274f308a9e71aea2fe5149baf93ee2c8fa4

    • SHA256

      28ebc8ec970763617065a51cee019141fe5f84c4542ed42333ede982294d4ec5

    • SHA512

      f59ebe57932047bc7e2b46bf3a20cc731f06a561fb66dc76e0eeb86b498c1745ca60116dec49c13cc8b353b715d268c4622d478c5e302e9cb791a9fde93296a7

    • SSDEEP

      3072:+gSuywe6x1ACSZEuNtV+TkqDXkyzbMeJRL3CNa/U9fStrveyk8TZgEd2ZGkFY:tnS62Fl+pkeJl3CvRStrFl+EYM

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks