General

  • Target

    4ce06b6759df2f433c1da9a8100d3c03_JaffaCakes118

  • Size

    214KB

  • Sample

    240516-y6n1baeh37

  • MD5

    4ce06b6759df2f433c1da9a8100d3c03

  • SHA1

    c2468348f90f1dd05962bf93c9ab1833e7bad115

  • SHA256

    ea1d92c3d94727066636b93e3cfe85331eb2865e15f86bc20978be99272ddb0d

  • SHA512

    9e611a944a8f8eecf7cbbfc70c6e25904095c400db72b1f45e3028a7f187a77d2c785c7b7e25bf8733453bfa01934c3e29eb93ddde09e23ce3da3435a0404e9c

  • SSDEEP

    6144:54+U6OuehTIXJnxeecA9ikbl4yB6ETGzM0yT:a+U6O7eh9cA/lV6ETGw0yT

Malware Config

Extracted

Family

icedid

C2

ldrshekel.casa

Targets

    • Target

      4ce06b6759df2f433c1da9a8100d3c03_JaffaCakes118

    • Size

      214KB

    • MD5

      4ce06b6759df2f433c1da9a8100d3c03

    • SHA1

      c2468348f90f1dd05962bf93c9ab1833e7bad115

    • SHA256

      ea1d92c3d94727066636b93e3cfe85331eb2865e15f86bc20978be99272ddb0d

    • SHA512

      9e611a944a8f8eecf7cbbfc70c6e25904095c400db72b1f45e3028a7f187a77d2c785c7b7e25bf8733453bfa01934c3e29eb93ddde09e23ce3da3435a0404e9c

    • SSDEEP

      6144:54+U6OuehTIXJnxeecA9ikbl4yB6ETGzM0yT:a+U6O7eh9cA/lV6ETGw0yT

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

    • Blocklisted process makes network request

MITRE ATT&CK Matrix

Tasks