General
-
Target
582ad51b14aec27c377e94075c8f7acb_JaffaCakes118
-
Size
406KB
-
Sample
240519-c7nv2see98
-
MD5
582ad51b14aec27c377e94075c8f7acb
-
SHA1
821f9c75558339044a1491db3165d5445b0a3f06
-
SHA256
2de6bde148b9a42a65f5dae36c903811e56d702d7d319900877f2d5d74273236
-
SHA512
a25fa0130b6a78deeaa3941a513a3da8aaa60d2439f1224274d8d7f290bf7cd4463c63678e8270ad8e89c70a7927302d9da427df51dcf5fb970d195c947c2fad
-
SSDEEP
6144:MU/OLpMfqR6vtVIgyPFiChgkX7WOMeLpebnZgUe4A29pNwz:MU/OLCftLqPACIeoFa4A29Dwz
Static task
static1
Behavioral task
behavioral1
Sample
582ad51b14aec27c377e94075c8f7acb_JaffaCakes118.dll
Resource
win7-20240221-en
Malware Config
Extracted
icedid
ldrruble.casa
Targets
-
-
Target
582ad51b14aec27c377e94075c8f7acb_JaffaCakes118
-
Size
406KB
-
MD5
582ad51b14aec27c377e94075c8f7acb
-
SHA1
821f9c75558339044a1491db3165d5445b0a3f06
-
SHA256
2de6bde148b9a42a65f5dae36c903811e56d702d7d319900877f2d5d74273236
-
SHA512
a25fa0130b6a78deeaa3941a513a3da8aaa60d2439f1224274d8d7f290bf7cd4463c63678e8270ad8e89c70a7927302d9da427df51dcf5fb970d195c947c2fad
-
SSDEEP
6144:MU/OLpMfqR6vtVIgyPFiChgkX7WOMeLpebnZgUe4A29pNwz:MU/OLCftLqPACIeoFa4A29Dwz
-
IcedID First Stage Loader
-
Blocklisted process makes network request
-