General
-
Target
5d7ce2398942eb03bd0065aea3d5da15_JaffaCakes118
-
Size
406KB
-
Sample
240520-gjlg8seh7x
-
MD5
5d7ce2398942eb03bd0065aea3d5da15
-
SHA1
8c1977305284f6ef719d6e92f0e90f069476a62a
-
SHA256
705e14735da74b107357a676c15b07c0f0c86888b8f98ba86e1029ff4e4858df
-
SHA512
a014ab056f924d3a037df8bbdd59cc8e3f95a25c5c6fed04a5a90aa848aca5af2700b4ae1367d9a92efe7eb82265c8c5ecf5e24ba251bc752c68ba49bece9fa6
-
SSDEEP
6144:MU/OLpMfiR6vtVIgyPFiChgkX7WOMeLpebnZgUe4A29pNwzg:MU/OLCf1LqPACIeoFa4A29Dwzg
Static task
static1
Behavioral task
behavioral1
Sample
5d7ce2398942eb03bd0065aea3d5da15_JaffaCakes118.dll
Resource
win7-20240508-en
Malware Config
Extracted
icedid
ldrruble.casa
Targets
-
-
Target
5d7ce2398942eb03bd0065aea3d5da15_JaffaCakes118
-
Size
406KB
-
MD5
5d7ce2398942eb03bd0065aea3d5da15
-
SHA1
8c1977305284f6ef719d6e92f0e90f069476a62a
-
SHA256
705e14735da74b107357a676c15b07c0f0c86888b8f98ba86e1029ff4e4858df
-
SHA512
a014ab056f924d3a037df8bbdd59cc8e3f95a25c5c6fed04a5a90aa848aca5af2700b4ae1367d9a92efe7eb82265c8c5ecf5e24ba251bc752c68ba49bece9fa6
-
SSDEEP
6144:MU/OLpMfiR6vtVIgyPFiChgkX7WOMeLpebnZgUe4A29pNwzg:MU/OLCf1LqPACIeoFa4A29Dwzg
-
IcedID First Stage Loader
-
Blocklisted process makes network request
-