General

  • Target

    e8577d641fbf02de5f7d11f5e8c834e0_JaffaCakes118

  • Size

    351KB

  • Sample

    240408-y8lmzaba32

  • MD5

    e8577d641fbf02de5f7d11f5e8c834e0

  • SHA1

    5e24f29679b657b687562cb2e0c216deebebaf87

  • SHA256

    63cf341941100f4eff687757c63d108a4d461fd689195ae34c04f821017c3252

  • SHA512

    6b0017ba88223a9ad0073df94f25f565f941637632bf767d36582f89a1907e6d82f651fec8fa6d1aefbd95ec10f80c3b26fc7cb322132a84b2d7243d54a22547

  • SSDEEP

    6144:8iiXEa4OKIKdhNux8C3BQDfGjaBedg++AOfWQCaUS:y4IKdKxt3BCfrBef+war

Malware Config

Extracted

Family

icedid

C2

americansoldat.link

Targets

    • Target

      e8577d641fbf02de5f7d11f5e8c834e0_JaffaCakes118

    • Size

      351KB

    • MD5

      e8577d641fbf02de5f7d11f5e8c834e0

    • SHA1

      5e24f29679b657b687562cb2e0c216deebebaf87

    • SHA256

      63cf341941100f4eff687757c63d108a4d461fd689195ae34c04f821017c3252

    • SHA512

      6b0017ba88223a9ad0073df94f25f565f941637632bf767d36582f89a1907e6d82f651fec8fa6d1aefbd95ec10f80c3b26fc7cb322132a84b2d7243d54a22547

    • SSDEEP

      6144:8iiXEa4OKIKdhNux8C3BQDfGjaBedg++AOfWQCaUS:y4IKdKxt3BCfrBef+war

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

    • Blocklisted process makes network request

MITRE ATT&CK Matrix

Tasks