General

  • Target

    JaffaCakes118_60a072a03519396b004141f58e7a2ee55c528651a1416b7dbaf14e8a26eac6f8

  • Size

    161KB

  • Sample

    241230-gj3frazpb1

  • MD5

    ba3be0e9f4692c31784d22fb96a5624d

  • SHA1

    67e978181c2b05986f39b508e80caa6bc59a724e

  • SHA256

    60a072a03519396b004141f58e7a2ee55c528651a1416b7dbaf14e8a26eac6f8

  • SHA512

    3ae0d63efd6cd34b9b9b0b8a65bfe2b92b1b44b9171506d9cc7813a5cc874d92ef1f5c09ada14476e59d6f36f4aa868eb5e588d6ca9afa71a0b689231e7668b7

  • SSDEEP

    3072:W1Suywe6x1ACSZEuNtV+TkqDXkyzbMeJRL3CNa/U9fStrveyk8TZgEd2wGkFY:YnS62Fl+pkeJl3CvRStrFl+EYh

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

78.46.73.125:443

185.148.168.26:2303

66.113.160.126:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_60a072a03519396b004141f58e7a2ee55c528651a1416b7dbaf14e8a26eac6f8

    • Size

      161KB

    • MD5

      ba3be0e9f4692c31784d22fb96a5624d

    • SHA1

      67e978181c2b05986f39b508e80caa6bc59a724e

    • SHA256

      60a072a03519396b004141f58e7a2ee55c528651a1416b7dbaf14e8a26eac6f8

    • SHA512

      3ae0d63efd6cd34b9b9b0b8a65bfe2b92b1b44b9171506d9cc7813a5cc874d92ef1f5c09ada14476e59d6f36f4aa868eb5e588d6ca9afa71a0b689231e7668b7

    • SSDEEP

      3072:W1Suywe6x1ACSZEuNtV+TkqDXkyzbMeJRL3CNa/U9fStrveyk8TZgEd2wGkFY:YnS62Fl+pkeJl3CvRStrFl+EYh

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks