General
-
Target
e8577d641fbf02de5f7d11f5e8c834e0_JaffaCakes118
-
Size
351KB
-
Sample
240408-y8lmzaba32
-
MD5
e8577d641fbf02de5f7d11f5e8c834e0
-
SHA1
5e24f29679b657b687562cb2e0c216deebebaf87
-
SHA256
63cf341941100f4eff687757c63d108a4d461fd689195ae34c04f821017c3252
-
SHA512
6b0017ba88223a9ad0073df94f25f565f941637632bf767d36582f89a1907e6d82f651fec8fa6d1aefbd95ec10f80c3b26fc7cb322132a84b2d7243d54a22547
-
SSDEEP
6144:8iiXEa4OKIKdhNux8C3BQDfGjaBedg++AOfWQCaUS:y4IKdKxt3BCfrBef+war
Static task
static1
Behavioral task
behavioral1
Sample
e8577d641fbf02de5f7d11f5e8c834e0_JaffaCakes118.dll
Resource
win7-20231129-en
Malware Config
Extracted
icedid
americansoldat.link
Targets
-
-
Target
e8577d641fbf02de5f7d11f5e8c834e0_JaffaCakes118
-
Size
351KB
-
MD5
e8577d641fbf02de5f7d11f5e8c834e0
-
SHA1
5e24f29679b657b687562cb2e0c216deebebaf87
-
SHA256
63cf341941100f4eff687757c63d108a4d461fd689195ae34c04f821017c3252
-
SHA512
6b0017ba88223a9ad0073df94f25f565f941637632bf767d36582f89a1907e6d82f651fec8fa6d1aefbd95ec10f80c3b26fc7cb322132a84b2d7243d54a22547
-
SSDEEP
6144:8iiXEa4OKIKdhNux8C3BQDfGjaBedg++AOfWQCaUS:y4IKdKxt3BCfrBef+war
-
IcedID First Stage Loader
-
Blocklisted process makes network request
-