General

  • Target

    2f9f7be08b17f2cdcaabc4c7dae6c9bd_JaffaCakes118

  • Size

    211KB

  • Sample

    240510-r2qj1sbb2z

  • MD5

    2f9f7be08b17f2cdcaabc4c7dae6c9bd

  • SHA1

    77d0781343f02cf5636f6be94e37b1cd61975275

  • SHA256

    55bc7ae7ab1017eb75387291424a67b9655d52e9357005caacbbb997dada592c

  • SHA512

    1e2576484a434e93dce8d558f23d25d177453c0c32d0263afbc84c0ce6bc263eb42c0206c06963b67b98e130f725bcbee04a505dd40c781d1b89340cc32ec76b

  • SSDEEP

    6144:6ZLwAyyWMa3NIBkL6LDW8dTZdw702edvxiuYOO6umz4:6ZLwAyyHadIBkLIi8dTL2SvguYOO1mk

Malware Config

Extracted

Family

icedid

C2

ldrstar.casa

Targets

    • Target

      2f9f7be08b17f2cdcaabc4c7dae6c9bd_JaffaCakes118

    • Size

      211KB

    • MD5

      2f9f7be08b17f2cdcaabc4c7dae6c9bd

    • SHA1

      77d0781343f02cf5636f6be94e37b1cd61975275

    • SHA256

      55bc7ae7ab1017eb75387291424a67b9655d52e9357005caacbbb997dada592c

    • SHA512

      1e2576484a434e93dce8d558f23d25d177453c0c32d0263afbc84c0ce6bc263eb42c0206c06963b67b98e130f725bcbee04a505dd40c781d1b89340cc32ec76b

    • SSDEEP

      6144:6ZLwAyyWMa3NIBkL6LDW8dTZdw702edvxiuYOO6umz4:6ZLwAyyHadIBkLIi8dTL2SvguYOO1mk

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

    • Blocklisted process makes network request

MITRE ATT&CK Matrix

Tasks