General

  • Target

    JaffaCakes118_7b0483f03170df71375e2e0cb5d064e205b6d50c10ffe852dccb9fc44effb5cb

  • Size

    159KB

  • Sample

    241230-z3rgpsypdn

  • MD5

    e36885cb295effddc2fa051d909ae23e

  • SHA1

    5c471c275a9cb6f414298f237ee0f2131c9a6693

  • SHA256

    7b0483f03170df71375e2e0cb5d064e205b6d50c10ffe852dccb9fc44effb5cb

  • SHA512

    2aef9edfe10ebcce3d3a709504f79fb9627755ab703c696ee851018d5082c449a5a16d8f04f13bbfd1a4b6dcbe017433e1752b8e8e548cbb8cbf17a254095a5c

  • SSDEEP

    3072:R58CMtKJlXoDRl4epTGmoAc7iTRilfn6wlYYbZwd:QnClXSRCADTR0VlJZw

Malware Config

Extracted

Family

dridex

Botnet

22203

C2

78.46.73.125:443

185.148.168.26:2303

66.113.160.126:8172

Targets

    • Target

      JaffaCakes118_7b0483f03170df71375e2e0cb5d064e205b6d50c10ffe852dccb9fc44effb5cb

    • Size

      159KB

    • MD5

      e36885cb295effddc2fa051d909ae23e

    • SHA1

      5c471c275a9cb6f414298f237ee0f2131c9a6693

    • SHA256

      7b0483f03170df71375e2e0cb5d064e205b6d50c10ffe852dccb9fc44effb5cb

    • SHA512

      2aef9edfe10ebcce3d3a709504f79fb9627755ab703c696ee851018d5082c449a5a16d8f04f13bbfd1a4b6dcbe017433e1752b8e8e548cbb8cbf17a254095a5c

    • SSDEEP

      3072:R58CMtKJlXoDRl4epTGmoAc7iTRilfn6wlYYbZwd:QnClXSRCADTR0VlJZw

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks