General

  • Target

    JaffaCakes118_f61fa71ac3d71558b8ce3946099956746e083295312f46789944d3078b7ef080

  • Size

    161KB

  • Sample

    241230-fmz95aypck

  • MD5

    ada43de5b1248b7517a72773c87738c1

  • SHA1

    62ac8da0cdb89c1a81ea3dec1ff3a4013867942f

  • SHA256

    f61fa71ac3d71558b8ce3946099956746e083295312f46789944d3078b7ef080

  • SHA512

    9217adddba9d632827603de7db023c72bf2c09fe6392ae99347eb9e56e4255482268c4e67df1ca7372fe0d72823c96a83c4376e26cf54d9b52daf74e08701982

  • SSDEEP

    3072:+1Suywe6x1ACSZEuNtV+TkqDXkyzbMeJRL3CNa/U9fStrveyk8TZgEd2wGkFY:AnS62Fl+pkeJl3CvRStrFl+EYh

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

78.46.73.125:443

185.148.168.26:2303

66.113.160.126:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_f61fa71ac3d71558b8ce3946099956746e083295312f46789944d3078b7ef080

    • Size

      161KB

    • MD5

      ada43de5b1248b7517a72773c87738c1

    • SHA1

      62ac8da0cdb89c1a81ea3dec1ff3a4013867942f

    • SHA256

      f61fa71ac3d71558b8ce3946099956746e083295312f46789944d3078b7ef080

    • SHA512

      9217adddba9d632827603de7db023c72bf2c09fe6392ae99347eb9e56e4255482268c4e67df1ca7372fe0d72823c96a83c4376e26cf54d9b52daf74e08701982

    • SSDEEP

      3072:+1Suywe6x1ACSZEuNtV+TkqDXkyzbMeJRL3CNa/U9fStrveyk8TZgEd2wGkFY:AnS62Fl+pkeJl3CvRStrFl+EYh

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks