General
-
Target
4ce06b6759df2f433c1da9a8100d3c03_JaffaCakes118
-
Size
214KB
-
Sample
240516-y6n1baeh37
-
MD5
4ce06b6759df2f433c1da9a8100d3c03
-
SHA1
c2468348f90f1dd05962bf93c9ab1833e7bad115
-
SHA256
ea1d92c3d94727066636b93e3cfe85331eb2865e15f86bc20978be99272ddb0d
-
SHA512
9e611a944a8f8eecf7cbbfc70c6e25904095c400db72b1f45e3028a7f187a77d2c785c7b7e25bf8733453bfa01934c3e29eb93ddde09e23ce3da3435a0404e9c
-
SSDEEP
6144:54+U6OuehTIXJnxeecA9ikbl4yB6ETGzM0yT:a+U6O7eh9cA/lV6ETGw0yT
Static task
static1
Behavioral task
behavioral1
Sample
4ce06b6759df2f433c1da9a8100d3c03_JaffaCakes118.dll
Resource
win7-20240221-en
Malware Config
Extracted
icedid
ldrshekel.casa
Targets
-
-
Target
4ce06b6759df2f433c1da9a8100d3c03_JaffaCakes118
-
Size
214KB
-
MD5
4ce06b6759df2f433c1da9a8100d3c03
-
SHA1
c2468348f90f1dd05962bf93c9ab1833e7bad115
-
SHA256
ea1d92c3d94727066636b93e3cfe85331eb2865e15f86bc20978be99272ddb0d
-
SHA512
9e611a944a8f8eecf7cbbfc70c6e25904095c400db72b1f45e3028a7f187a77d2c785c7b7e25bf8733453bfa01934c3e29eb93ddde09e23ce3da3435a0404e9c
-
SSDEEP
6144:54+U6OuehTIXJnxeecA9ikbl4yB6ETGzM0yT:a+U6O7eh9cA/lV6ETGw0yT
-
IcedID First Stage Loader
-
Blocklisted process makes network request
-