General

  • Target

    7b8b3de47c3fd708b0bf453fac1ff706_JaffaCakes118

  • Size

    211KB

  • Sample

    240528-d1zveaec27

  • MD5

    7b8b3de47c3fd708b0bf453fac1ff706

  • SHA1

    ccf109d735ced74a4e45c6b6fdba0714134d3a69

  • SHA256

    6571b88739b154807adbbe7b8d3ff75543887405f066489fb773a2186b862132

  • SHA512

    0734d5ef4568a0fee0dd7fa2b932e4fdeaaea9737bf891805b5c09ddce52dad4e1ca01a705d3139db284b655a99283f282f8440eec237aefe16595fdce1f3b1c

  • SSDEEP

    6144:6ZLwbyyWMa3NIBkL6LDW8dTZdw702edvxiuYOO6umz4N:6ZLwbyyHadIBkLIi8dTL2SvguYOO1mkN

Malware Config

Extracted

Family

icedid

C2

ldrstar.casa

Targets

    • Target

      7b8b3de47c3fd708b0bf453fac1ff706_JaffaCakes118

    • Size

      211KB

    • MD5

      7b8b3de47c3fd708b0bf453fac1ff706

    • SHA1

      ccf109d735ced74a4e45c6b6fdba0714134d3a69

    • SHA256

      6571b88739b154807adbbe7b8d3ff75543887405f066489fb773a2186b862132

    • SHA512

      0734d5ef4568a0fee0dd7fa2b932e4fdeaaea9737bf891805b5c09ddce52dad4e1ca01a705d3139db284b655a99283f282f8440eec237aefe16595fdce1f3b1c

    • SSDEEP

      6144:6ZLwbyyWMa3NIBkL6LDW8dTZdw702edvxiuYOO6umz4N:6ZLwbyyHadIBkLIi8dTL2SvguYOO1mkN

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

    • Blocklisted process makes network request

MITRE ATT&CK Matrix

Tasks