Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 13:05
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
6e9beb70949e08edb764bec70d8c280c_JaffaCakes118.exe
Resource
win7-20240508-en
windows7-x64
3 signatures
150 seconds
General
-
Target
6e9beb70949e08edb764bec70d8c280c_JaffaCakes118.exe
-
Size
232KB
-
MD5
6e9beb70949e08edb764bec70d8c280c
-
SHA1
f873e54284fea6b0182f783960f3ed4fa270232f
-
SHA256
9d7755e665f6a444252634488e167b54703914aac9fc7cd07a3f5b8ccf88c2cf
-
SHA512
de9118e81f39dfd58acc973ff1be94eb028b79ac2e7105aedbb145daec1008a8bf0442f374b6d6cb8ebc34c1b19175a4edae9da6b03560a5d8619db1c9356580
-
SSDEEP
3072:OMhhq+IsxN1ohHbhhrfKnGuFiVvYiEg5NJo2/fmBmjup9QzE:ThmTfKPFiVgi2CmBmCQE
Malware Config
Extracted
Family
icedid
Botnet
548174735
C2
aginia.net
aginia.top
aginia.in
aginia.tel
telected.com
telected.xyz
Attributes
-
auth_var
5
-
url_path
/index.php
Signatures
-
IcedID Second Stage Loader 1 IoCs
resource yara_rule behavioral2/memory/1692-17-0x0000000002FB0000-0x0000000002FB5000-memory.dmp IcedidSecondLoader -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1692 6e9beb70949e08edb764bec70d8c280c_JaffaCakes118.exe 1692 6e9beb70949e08edb764bec70d8c280c_JaffaCakes118.exe