General

  • Target

    8c12edf1891afd90359d66a2405b7ee7_JaffaCakes118

  • Size

    267KB

  • Sample

    240811-1h1ejsteph

  • MD5

    8c12edf1891afd90359d66a2405b7ee7

  • SHA1

    2b7dfdff6a0bbf5741fd1cd8438589b663d6cb9d

  • SHA256

    01c9f99bfec9b672a6cbe2bd465345e7b28ebbe32bae53f675b6ee2746e20335

  • SHA512

    1b6897e1e627298e6a68c1a0ba334cd37c7c8726eff656a369d3ce8783a932fb84c3329ad3d362e27c4d10b241bcacadeb50087c8948af461e69f5eed7a56f64

  • SSDEEP

    3072:WKCvsQ1ZkyvvaVB5wW760YyUu5VELUUtg7+HqOtTsTERJLGvumPOUIrLeAg0FujH:LQrkoCQvytr7UtkiBvPLiAOg3kaeXV6y

Malware Config

Extracted

Family

icedid

C2

wertigohol.click

Targets

    • Target

      8c12edf1891afd90359d66a2405b7ee7_JaffaCakes118

    • Size

      267KB

    • MD5

      8c12edf1891afd90359d66a2405b7ee7

    • SHA1

      2b7dfdff6a0bbf5741fd1cd8438589b663d6cb9d

    • SHA256

      01c9f99bfec9b672a6cbe2bd465345e7b28ebbe32bae53f675b6ee2746e20335

    • SHA512

      1b6897e1e627298e6a68c1a0ba334cd37c7c8726eff656a369d3ce8783a932fb84c3329ad3d362e27c4d10b241bcacadeb50087c8948af461e69f5eed7a56f64

    • SSDEEP

      3072:WKCvsQ1ZkyvvaVB5wW760YyUu5VELUUtg7+HqOtTsTERJLGvumPOUIrLeAg0FujH:LQrkoCQvytr7UtkiBvPLiAOg3kaeXV6y

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

    • Blocklisted process makes network request

MITRE ATT&CK Enterprise v15

Tasks