General
-
Target
0e3d9982ef71756615d59ccd5d05abbe_JaffaCakes118
-
Size
406KB
-
Sample
240502-mgj5aaeh2t
-
MD5
0e3d9982ef71756615d59ccd5d05abbe
-
SHA1
c089fb31acf2284b4c33df45696b3750d98ae19c
-
SHA256
89e881e0beb8adc93f3b45e835e68355e855d951a44d18153b7f042989b353e0
-
SHA512
241b56a8fe6af00d80d4757522eefbc9e135e878b938b8eca4b8be6aae9411629d7687e1f476e8cd7a0957d6f1fce59fc9726011185e702dc0d5c501c1457a3a
-
SSDEEP
6144:MU/OLpMfgR6vtVIgyPFiChgkX7WOMeLpebnZgUe4A29pNwz:MU/OLCfvLqPACIeoFa4A29Dwz
Static task
static1
Behavioral task
behavioral1
Sample
0e3d9982ef71756615d59ccd5d05abbe_JaffaCakes118.dll
Resource
win7-20240220-en
Malware Config
Extracted
icedid
ldrruble.casa
Targets
-
-
Target
0e3d9982ef71756615d59ccd5d05abbe_JaffaCakes118
-
Size
406KB
-
MD5
0e3d9982ef71756615d59ccd5d05abbe
-
SHA1
c089fb31acf2284b4c33df45696b3750d98ae19c
-
SHA256
89e881e0beb8adc93f3b45e835e68355e855d951a44d18153b7f042989b353e0
-
SHA512
241b56a8fe6af00d80d4757522eefbc9e135e878b938b8eca4b8be6aae9411629d7687e1f476e8cd7a0957d6f1fce59fc9726011185e702dc0d5c501c1457a3a
-
SSDEEP
6144:MU/OLpMfgR6vtVIgyPFiChgkX7WOMeLpebnZgUe4A29pNwz:MU/OLCfvLqPACIeoFa4A29Dwz
-
IcedID First Stage Loader
-
Blocklisted process makes network request
-