General

  • Target

    29e709ceb0fa00ed56cd9e3ced4fdc70_JaffaCakes118

  • Size

    207KB

  • Sample

    240707-lx1xas1fqg

  • MD5

    29e709ceb0fa00ed56cd9e3ced4fdc70

  • SHA1

    c66bede3d34261c2b86fb9f1d75ac5059c4233b9

  • SHA256

    7aa3ef953f07267af9389d26ce7214cfcef453436c7dee78f39b924d21312464

  • SHA512

    d1800ad42f559aabb32b5da4430b68050d9f86ea52c017782d25ee7df31ec7cd238b67e9722125f0ba90faabc47481dfad48ef64c4785c4083969b3b0b766641

  • SSDEEP

    3072:xP0eLiixjEWc6iRczWORSyoUTgu5S+fPZO+vmj6v3CPyf/K:xP1xFBWBrogL+hm+v3

Malware Config

Extracted

Family

icedid

Targets

    • Target

      29e709ceb0fa00ed56cd9e3ced4fdc70_JaffaCakes118

    • Size

      207KB

    • MD5

      29e709ceb0fa00ed56cd9e3ced4fdc70

    • SHA1

      c66bede3d34261c2b86fb9f1d75ac5059c4233b9

    • SHA256

      7aa3ef953f07267af9389d26ce7214cfcef453436c7dee78f39b924d21312464

    • SHA512

      d1800ad42f559aabb32b5da4430b68050d9f86ea52c017782d25ee7df31ec7cd238b67e9722125f0ba90faabc47481dfad48ef64c4785c4083969b3b0b766641

    • SSDEEP

      3072:xP0eLiixjEWc6iRczWORSyoUTgu5S+fPZO+vmj6v3CPyf/K:xP1xFBWBrogL+hm+v3

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID Second Stage Loader

    • Drops startup file

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks