General

  • Target

    55a8da7ffdb5beeb293e27851793bb52_JaffaCakes118

  • Size

    211KB

  • Sample

    240518-tt9zsscc76

  • MD5

    55a8da7ffdb5beeb293e27851793bb52

  • SHA1

    35fa0d2ce0d459524b79e3b3b839b50639a8052e

  • SHA256

    c91847b9b00dddebd4f694412f2cc4c7346c15aa3cda2da856d9b0860a17ec50

  • SHA512

    28ddd40b08bf83e89b0c92d89159e79f0103d7add097ab099a26103eb31f52a4ec9669290ccfa588d7075e71d712b34c10b625d644a425107535208307dbdb53

  • SSDEEP

    6144:6ZLwRyyWMa3NIBkL6LDW8dTZdw702edvxiuYOO6umz4N:6ZLwRyyHadIBkLIi8dTL2SvguYOO1mkN

Malware Config

Extracted

Family

icedid

C2

ldrstar.casa

Targets

    • Target

      55a8da7ffdb5beeb293e27851793bb52_JaffaCakes118

    • Size

      211KB

    • MD5

      55a8da7ffdb5beeb293e27851793bb52

    • SHA1

      35fa0d2ce0d459524b79e3b3b839b50639a8052e

    • SHA256

      c91847b9b00dddebd4f694412f2cc4c7346c15aa3cda2da856d9b0860a17ec50

    • SHA512

      28ddd40b08bf83e89b0c92d89159e79f0103d7add097ab099a26103eb31f52a4ec9669290ccfa588d7075e71d712b34c10b625d644a425107535208307dbdb53

    • SSDEEP

      6144:6ZLwRyyWMa3NIBkL6LDW8dTZdw702edvxiuYOO6umz4N:6ZLwRyyHadIBkLIi8dTL2SvguYOO1mkN

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

    • Blocklisted process makes network request

MITRE ATT&CK Matrix

Tasks