General
-
Target
JaffaCakes118_6e8783ce55907a849f9d8594db57c58d6eac717c7f5e4f8f52752898fe3f1d83
-
Size
31KB
-
Sample
241221-yc1r1sxqck
-
MD5
8f4c32cef17d1a99496a62bd6d7be7e1
-
SHA1
ab542c0d827d1381a1f70f22ca9ce8275f0f46ea
-
SHA256
6e8783ce55907a849f9d8594db57c58d6eac717c7f5e4f8f52752898fe3f1d83
-
SHA512
8378e8553aeacf4cc1ae52efd4258e562d2d8bd166831b96c571dcb7c4b9228c910c240a4012ef26e7369ff9cc5ea4a2be904f9ab798fb6c5d30d37c3f662adb
-
SSDEEP
768:4jUAoPIOKoan/XJo4C7CuPXxjlnOYGGHWOAeUH4uPAt7:4jUdDan/XJoBPXll2DB7Ax
Static task
static1
Behavioral task
behavioral1
Sample
1ba223ba6300c05c1e29105e519d884c2cebdbd1485838a46378c10dc77a8623.xll
Resource
win7-20240903-en
Malware Config
Extracted
Extracted
icedid
497724135
ovedfromasi.top
Targets
-
-
Target
1ba223ba6300c05c1e29105e519d884c2cebdbd1485838a46378c10dc77a8623
-
Size
70KB
-
MD5
9ba7141f0a8d4840393af0230184dccd
-
SHA1
4c5a61203719c4fb3e64117a6c5e5980bd257802
-
SHA256
1ba223ba6300c05c1e29105e519d884c2cebdbd1485838a46378c10dc77a8623
-
SHA512
e2a857771574da00da240b84ad91b99d01cbe4fcf4dc0e7a592bce490752646a84e13010ed0523ce50891058cfdfd5cdc708660d4ad1b7184e43fd6056e1162d
-
SSDEEP
1536:MXUu709gnZgl7f/3jWCgiMthg8Mi3lHg9gIgmfgCjMiAOqTu/+vXWPbge96L94hH:Mw9eg5fPKCNAXMixmHBfFzmu/mAbgw1h
-
Icedid family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Loads dropped DLL
-