General

  • Target

    JaffaCakes118_842d103f2a7083b553039dfc3c84d02d435a59ab2ca1cfb965180c76ed636b77

  • Size

    31KB

  • Sample

    241222-j6kwbs1ldn

  • MD5

    214348697d558d52160bfaee73daa67f

  • SHA1

    e31f304bcfd1dc6bb0edcbf99249da47645231d9

  • SHA256

    842d103f2a7083b553039dfc3c84d02d435a59ab2ca1cfb965180c76ed636b77

  • SHA512

    bfd54147f0ffb9d64442a7ac15fcde13369f580f5ec5ee8d06ba066c9df4d3b78044d79a53f1476eadf14479f5b87455a0b2da07222b146df969788d246ade3c

  • SSDEEP

    768:DjUAoPIOKoan/XJo4C7CuPXxjlnOYGGHWOAeUH4uPAte:DjUdDan/XJoBPXll2DB7Aw

Malware Config

Extracted

Language
xlm4.0
Source

Extracted

Family

icedid

Campaign

497724135

C2

ovedfromasi.top

Targets

    • Target

      1ba223ba6300c05c1e29105e519d884c2cebdbd1485838a46378c10dc77a8623

    • Size

      70KB

    • MD5

      9ba7141f0a8d4840393af0230184dccd

    • SHA1

      4c5a61203719c4fb3e64117a6c5e5980bd257802

    • SHA256

      1ba223ba6300c05c1e29105e519d884c2cebdbd1485838a46378c10dc77a8623

    • SHA512

      e2a857771574da00da240b84ad91b99d01cbe4fcf4dc0e7a592bce490752646a84e13010ed0523ce50891058cfdfd5cdc708660d4ad1b7184e43fd6056e1162d

    • SSDEEP

      1536:MXUu709gnZgl7f/3jWCgiMthg8Mi3lHg9gIgmfgCjMiAOqTu/+vXWPbge96L94hH:Mw9eg5fPKCNAXMixmHBfFzmu/mAbgw1h

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Icedid family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks