General
-
Target
JaffaCakes118_0863f9c1ae06a685b26bdb3b96a06615fa75b91f698fa5927bf1cb2234d9b580
-
Size
382KB
-
Sample
241222-a35xnawmds
-
MD5
e3983a1c849e97587bacbf990ff4e426
-
SHA1
305644db8da0d2bf38e5ebd7933db3a39369d44f
-
SHA256
0863f9c1ae06a685b26bdb3b96a06615fa75b91f698fa5927bf1cb2234d9b580
-
SHA512
8803b31a3d72e406ca8ed9fb800a2252896945fab4bd33e4360a9ea37336990b59087e6dc302a71f893f6c7adcd98be6a39b45b492f7c809d47fdb7137fd06cc
-
SSDEEP
6144:fOfzMdUik1UuZrPmI/jPsuCe2e7Bxq6G7dOwxZWIxjCQ+vOYAXAm:cDik1fZrHLsw7BIHZxjkbAwm
Static task
static1
Behavioral task
behavioral1
Sample
core.bat
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
core.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
pigeon64.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
pigeon64.dll
Resource
win10v2004-20241007-en
Malware Config
Extracted
icedid
1217670233
nnelforwfin.top
lakogrefop.rest
hangetilin.top
follytresh.co
-
auth_var
12
-
url_path
/posts/
Extracted
icedid
Targets
-
-
Target
core.bat
-
Size
184B
-
MD5
2b4f27b826aec08eb90ff784b25d048d
-
SHA1
b1444548b53ec112797cc7d03a1e227fe71315ca
-
SHA256
b976471778c3abead8001c5a7db7d39b461e88bbd5322a579d86c1ca725375fb
-
SHA512
d6316825b5372e445941b75b08b04aaee49bab12d752dba4691aac8093100d1632a1b07e6b7d6899c528e6777f0bcfcd977e02a7f8d559b29e205703f573d434
-
Icedid family
-
-
-
Target
pigeon64.dat
-
Size
159KB
-
MD5
de317e8f5ed28affbf38306925aa59a8
-
SHA1
38f670fadedf06bf12243b74618c5e4461416a6f
-
SHA256
b16bfd48ebbe416330327d2462bb5084bf0e3dfadd237b10e0c4670ed52532ef
-
SHA512
c9b02fa7effaeba55d1f324da2557c210b04b031991b1909d85dde90fed162d3c3afa8325ec96cd52f306074def915bf7c99e361502fea920bb33f68f322abce
-
SSDEEP
3072:Rgdn2kM3jGZuKnK8nqYLMZsylF9nmV0snOJVWHTSNV:RxkAjBK17sNNV
Score10/10-
Icedid family
-