General

  • Target

    82ac29c322c3a97d6b0a0bf528f28097_JaffaCakes118

  • Size

    171KB

  • Sample

    240530-b3zlbaah92

  • MD5

    82ac29c322c3a97d6b0a0bf528f28097

  • SHA1

    50d21c573262ba613796abd958b490fb6d65c407

  • SHA256

    7c94b78d14c95b438b0af4eb93596c2f7a64d8a9a1b2c9b300f5d4c43661a9b9

  • SHA512

    a2a48daf57cb7f48f055e5c6c38f15f81376195284ac4d10fe39f4ddecd5a1ae80f3a782fdcfce85620c2d4684140df29f20b17bba81a64dd262b2ee88a5d1f6

  • SSDEEP

    3072:aGlF282vlhUDj+PoJFXpeZpaZARWQJ1h52iWNgdxeoRUxNGhLKgUQh0BVj:H7eyaPonp2AmRWg1h3NxqxNuLKQyBx

Malware Config

Extracted

Family

icedid

C2

ldrpeso.casa

Targets

    • Target

      82ac29c322c3a97d6b0a0bf528f28097_JaffaCakes118

    • Size

      171KB

    • MD5

      82ac29c322c3a97d6b0a0bf528f28097

    • SHA1

      50d21c573262ba613796abd958b490fb6d65c407

    • SHA256

      7c94b78d14c95b438b0af4eb93596c2f7a64d8a9a1b2c9b300f5d4c43661a9b9

    • SHA512

      a2a48daf57cb7f48f055e5c6c38f15f81376195284ac4d10fe39f4ddecd5a1ae80f3a782fdcfce85620c2d4684140df29f20b17bba81a64dd262b2ee88a5d1f6

    • SSDEEP

      3072:aGlF282vlhUDj+PoJFXpeZpaZARWQJ1h52iWNgdxeoRUxNGhLKgUQh0BVj:H7eyaPonp2AmRWg1h3NxqxNuLKQyBx

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

    • Blocklisted process makes network request

MITRE ATT&CK Matrix

Tasks