General

  • Target

    JaffaCakes118_b4dd3fb90fc6e5d23272e1c9e53871d7736a7651c469523ebabb8a20e430c515

  • Size

    159KB

  • Sample

    241230-fcewfaylgm

  • MD5

    94f988033e4872e8ac9aa4b4dfdea0a3

  • SHA1

    85eead3ec3daeb601e51627f837785d43113198e

  • SHA256

    b4dd3fb90fc6e5d23272e1c9e53871d7736a7651c469523ebabb8a20e430c515

  • SHA512

    755549ee0afb5323f3ab68d4207ad91d36089d83c3e8aa7d40ec3c04a639e0f5b26ecd11b307c0eb96dae331cf5838a190286426e49c570de7ed263d902bf2ba

  • SSDEEP

    3072:E58CMtKJlXoDRl4epTGmoAc7iTRilfn6wlYYbZwd:1nClXSRCADTR0VlJZw

Malware Config

Extracted

Family

dridex

Botnet

22203

C2

78.46.73.125:443

185.148.168.26:2303

66.113.160.126:8172

Targets

    • Target

      JaffaCakes118_b4dd3fb90fc6e5d23272e1c9e53871d7736a7651c469523ebabb8a20e430c515

    • Size

      159KB

    • MD5

      94f988033e4872e8ac9aa4b4dfdea0a3

    • SHA1

      85eead3ec3daeb601e51627f837785d43113198e

    • SHA256

      b4dd3fb90fc6e5d23272e1c9e53871d7736a7651c469523ebabb8a20e430c515

    • SHA512

      755549ee0afb5323f3ab68d4207ad91d36089d83c3e8aa7d40ec3c04a639e0f5b26ecd11b307c0eb96dae331cf5838a190286426e49c570de7ed263d902bf2ba

    • SSDEEP

      3072:E58CMtKJlXoDRl4epTGmoAc7iTRilfn6wlYYbZwd:1nClXSRCADTR0VlJZw

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks