General

  • Target

    ad3778f31b3d3cc4ca4c51e3ffe9464a_JaffaCakes118

  • Size

    421KB

  • Sample

    240615-hh1q7s1fkh

  • MD5

    ad3778f31b3d3cc4ca4c51e3ffe9464a

  • SHA1

    da0f1fb7b9ca42f6ea7298f19a54121fd2660737

  • SHA256

    4df39fd80257e14192e2d2edc4500883edd7921e0be92d664ec4b995d8f82f24

  • SHA512

    29b4ee6cc0563277283e3934c80cc94327774892f81338b459804d97e2999d2840e59518981bd26b748aec88c8f111e0d8bad6df0dc9cf3c6beb3ace2bc64a7b

  • SSDEEP

    6144:Ipzb4zDZWem6SDwg21fh0k2Pk4+o9ydY//iptLNu5H32KgKC:IpzWDYemdkh1fj/dY/ctLNu5H3CK

Malware Config

Extracted

Family

icedid

C2

ldrmercury.casa

Targets

    • Target

      ad3778f31b3d3cc4ca4c51e3ffe9464a_JaffaCakes118

    • Size

      421KB

    • MD5

      ad3778f31b3d3cc4ca4c51e3ffe9464a

    • SHA1

      da0f1fb7b9ca42f6ea7298f19a54121fd2660737

    • SHA256

      4df39fd80257e14192e2d2edc4500883edd7921e0be92d664ec4b995d8f82f24

    • SHA512

      29b4ee6cc0563277283e3934c80cc94327774892f81338b459804d97e2999d2840e59518981bd26b748aec88c8f111e0d8bad6df0dc9cf3c6beb3ace2bc64a7b

    • SSDEEP

      6144:Ipzb4zDZWem6SDwg21fh0k2Pk4+o9ydY//iptLNu5H32KgKC:IpzWDYemdkh1fj/dY/ctLNu5H3CK

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

    • Blocklisted process makes network request

MITRE ATT&CK Matrix

Tasks