General

  • Target

    7de2125eba63b36cdc4f45b008a4118b_JaffaCakes118

  • Size

    211KB

  • Sample

    240528-wp9vcaff29

  • MD5

    7de2125eba63b36cdc4f45b008a4118b

  • SHA1

    b1c3ec138e2f104bac76852bf0d2bb4708e67922

  • SHA256

    d67e1fd5d40e841c1aedbbf65d5f72a69da5ac54e48ae92da1f428c9f18d8363

  • SHA512

    cbe3a45f1afde4e695f66d6bfb98e10a3fba41c1d2ecb5eee15c3a2e7d52b6d58ef878071452dab26427607c83040a18745a7f17227bac6d74add4969ff9b2fc

  • SSDEEP

    6144:6ZLwQyyWMa3NIBkL6LDW8dTZdw702edvxiuYOO6umz4N:6ZLwQyyHadIBkLIi8dTL2SvguYOO1mkN

Malware Config

Extracted

Family

icedid

C2

ldrstar.casa

Targets

    • Target

      7de2125eba63b36cdc4f45b008a4118b_JaffaCakes118

    • Size

      211KB

    • MD5

      7de2125eba63b36cdc4f45b008a4118b

    • SHA1

      b1c3ec138e2f104bac76852bf0d2bb4708e67922

    • SHA256

      d67e1fd5d40e841c1aedbbf65d5f72a69da5ac54e48ae92da1f428c9f18d8363

    • SHA512

      cbe3a45f1afde4e695f66d6bfb98e10a3fba41c1d2ecb5eee15c3a2e7d52b6d58ef878071452dab26427607c83040a18745a7f17227bac6d74add4969ff9b2fc

    • SSDEEP

      6144:6ZLwQyyWMa3NIBkL6LDW8dTZdw702edvxiuYOO6umz4N:6ZLwQyyHadIBkLIi8dTL2SvguYOO1mkN

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

    • Blocklisted process makes network request

MITRE ATT&CK Matrix

Tasks