General

  • Target

    2200c43b5d09f537abdc4ed2944db3d7_JaffaCakes118

  • Size

    176KB

  • Sample

    240507-2ey8rabe3z

  • MD5

    2200c43b5d09f537abdc4ed2944db3d7

  • SHA1

    af5355f9abd4aa8599f810d855ab1ea555b2001c

  • SHA256

    62c33622ba0e8b354c538c69a285fd6372d1da137da995d4c0960697df54232e

  • SHA512

    f47fcbc305ea51c396dd91dcf770a25f7f40d82f1ec31256ac920a8f773a1b60b0d6a8a369624cfa7eca703eb31e01908a1a2d0033453f4c2ee6122ac622ab0c

  • SSDEEP

    3072:aPKgZsYU009yEesYZfIeIXn8DBNiAHRDmm5mNWg8C6:lgZsYU009yEW7o8DOAHRDmm5msgG

Malware Config

Extracted

Family

icedid

Botnet

1604739030

C2

aginia.net

aginia.top

aginia.in

aginia.tel

telected.com

telected.xyz

Attributes
  • auth_var

    1

  • url_path

    /index.php

Targets

    • Target

      2200c43b5d09f537abdc4ed2944db3d7_JaffaCakes118

    • Size

      176KB

    • MD5

      2200c43b5d09f537abdc4ed2944db3d7

    • SHA1

      af5355f9abd4aa8599f810d855ab1ea555b2001c

    • SHA256

      62c33622ba0e8b354c538c69a285fd6372d1da137da995d4c0960697df54232e

    • SHA512

      f47fcbc305ea51c396dd91dcf770a25f7f40d82f1ec31256ac920a8f773a1b60b0d6a8a369624cfa7eca703eb31e01908a1a2d0033453f4c2ee6122ac622ab0c

    • SSDEEP

      3072:aPKgZsYU009yEesYZfIeIXn8DBNiAHRDmm5mNWg8C6:lgZsYU009yEW7o8DOAHRDmm5msgG

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID Second Stage Loader

MITRE ATT&CK Matrix

Tasks