General

  • Target

    JaffaCakes118_a2a890f60a43e989d113d50615436ee3b0d08c8919fa92990b572f74d794d9f7

  • Size

    159KB

  • Sample

    241230-wn234sskhl

  • MD5

    b727b970cf2e22a4d294efaf0d71dde5

  • SHA1

    0a8e52089c58769d526cf101c084812ee5f428a6

  • SHA256

    a2a890f60a43e989d113d50615436ee3b0d08c8919fa92990b572f74d794d9f7

  • SHA512

    9e23cc98e7d9b62a246f5dd51fe3b4afb65162fb122db054ce0e7a6af98862d6b229f720a4c83bd9296901d29f3cea0b75c6d233e506d7250ad9ef996e00de37

  • SSDEEP

    3072:s58CMtKJlXoDRl4epTGmoAc7iTRilfn6wlYYbZwd:dnClXSRCADTR0VlJZw

Malware Config

Extracted

Family

dridex

Botnet

22203

C2

78.46.73.125:443

185.148.168.26:2303

66.113.160.126:8172

Targets

    • Target

      JaffaCakes118_a2a890f60a43e989d113d50615436ee3b0d08c8919fa92990b572f74d794d9f7

    • Size

      159KB

    • MD5

      b727b970cf2e22a4d294efaf0d71dde5

    • SHA1

      0a8e52089c58769d526cf101c084812ee5f428a6

    • SHA256

      a2a890f60a43e989d113d50615436ee3b0d08c8919fa92990b572f74d794d9f7

    • SHA512

      9e23cc98e7d9b62a246f5dd51fe3b4afb65162fb122db054ce0e7a6af98862d6b229f720a4c83bd9296901d29f3cea0b75c6d233e506d7250ad9ef996e00de37

    • SSDEEP

      3072:s58CMtKJlXoDRl4epTGmoAc7iTRilfn6wlYYbZwd:dnClXSRCADTR0VlJZw

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks