General

  • Target

    0e3d9982ef71756615d59ccd5d05abbe_JaffaCakes118

  • Size

    406KB

  • Sample

    240502-mgj5aaeh2t

  • MD5

    0e3d9982ef71756615d59ccd5d05abbe

  • SHA1

    c089fb31acf2284b4c33df45696b3750d98ae19c

  • SHA256

    89e881e0beb8adc93f3b45e835e68355e855d951a44d18153b7f042989b353e0

  • SHA512

    241b56a8fe6af00d80d4757522eefbc9e135e878b938b8eca4b8be6aae9411629d7687e1f476e8cd7a0957d6f1fce59fc9726011185e702dc0d5c501c1457a3a

  • SSDEEP

    6144:MU/OLpMfgR6vtVIgyPFiChgkX7WOMeLpebnZgUe4A29pNwz:MU/OLCfvLqPACIeoFa4A29Dwz

Malware Config

Extracted

Family

icedid

C2

ldrruble.casa

Targets

    • Target

      0e3d9982ef71756615d59ccd5d05abbe_JaffaCakes118

    • Size

      406KB

    • MD5

      0e3d9982ef71756615d59ccd5d05abbe

    • SHA1

      c089fb31acf2284b4c33df45696b3750d98ae19c

    • SHA256

      89e881e0beb8adc93f3b45e835e68355e855d951a44d18153b7f042989b353e0

    • SHA512

      241b56a8fe6af00d80d4757522eefbc9e135e878b938b8eca4b8be6aae9411629d7687e1f476e8cd7a0957d6f1fce59fc9726011185e702dc0d5c501c1457a3a

    • SSDEEP

      6144:MU/OLpMfgR6vtVIgyPFiChgkX7WOMeLpebnZgUe4A29pNwz:MU/OLCfvLqPACIeoFa4A29Dwz

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

    • Blocklisted process makes network request

MITRE ATT&CK Matrix

Tasks