General
-
Target
JaffaCakes118_842d103f2a7083b553039dfc3c84d02d435a59ab2ca1cfb965180c76ed636b77
-
Size
31KB
-
Sample
241222-j6kwbs1ldn
-
MD5
214348697d558d52160bfaee73daa67f
-
SHA1
e31f304bcfd1dc6bb0edcbf99249da47645231d9
-
SHA256
842d103f2a7083b553039dfc3c84d02d435a59ab2ca1cfb965180c76ed636b77
-
SHA512
bfd54147f0ffb9d64442a7ac15fcde13369f580f5ec5ee8d06ba066c9df4d3b78044d79a53f1476eadf14479f5b87455a0b2da07222b146df969788d246ade3c
-
SSDEEP
768:DjUAoPIOKoan/XJo4C7CuPXxjlnOYGGHWOAeUH4uPAte:DjUdDan/XJoBPXll2DB7Aw
Static task
static1
Behavioral task
behavioral1
Sample
1ba223ba6300c05c1e29105e519d884c2cebdbd1485838a46378c10dc77a8623.xll
Resource
win7-20240903-en
Malware Config
Extracted
Extracted
icedid
497724135
ovedfromasi.top
Targets
-
-
Target
1ba223ba6300c05c1e29105e519d884c2cebdbd1485838a46378c10dc77a8623
-
Size
70KB
-
MD5
9ba7141f0a8d4840393af0230184dccd
-
SHA1
4c5a61203719c4fb3e64117a6c5e5980bd257802
-
SHA256
1ba223ba6300c05c1e29105e519d884c2cebdbd1485838a46378c10dc77a8623
-
SHA512
e2a857771574da00da240b84ad91b99d01cbe4fcf4dc0e7a592bce490752646a84e13010ed0523ce50891058cfdfd5cdc708660d4ad1b7184e43fd6056e1162d
-
SSDEEP
1536:MXUu709gnZgl7f/3jWCgiMthg8Mi3lHg9gIgmfgCjMiAOqTu/+vXWPbge96L94hH:Mw9eg5fPKCNAXMixmHBfFzmu/mAbgw1h
-
Icedid family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Loads dropped DLL
-