General

  • Target

    ad88c54c37ce7d75790df768ef14e2f5_JaffaCakes118

  • Size

    211KB

  • Sample

    240615-kcxtgaxdqq

  • MD5

    ad88c54c37ce7d75790df768ef14e2f5

  • SHA1

    298d7ba10332a0b9d220533ba337c2455d2f70e2

  • SHA256

    9c2b9591aa625e3dd4d8eae345b24e331bf731c9d5fa6455ac8e79bd6ec5d0d0

  • SHA512

    51c9b720c0a3e04d32e222b63a68e47accd3732992391897ed4db80b7160dab4cb72c150de185bc0b005878107fa556ba4a0154ff18c83e212b12aef9d847325

  • SSDEEP

    6144:6ZLwyyyWMa3NIBkL6LDW8dTZdw702edvxiuYOO6umz4N:6ZLwyyyHadIBkLIi8dTL2SvguYOO1mkN

Malware Config

Extracted

Family

icedid

C2

ldrstar.casa

Targets

    • Target

      ad88c54c37ce7d75790df768ef14e2f5_JaffaCakes118

    • Size

      211KB

    • MD5

      ad88c54c37ce7d75790df768ef14e2f5

    • SHA1

      298d7ba10332a0b9d220533ba337c2455d2f70e2

    • SHA256

      9c2b9591aa625e3dd4d8eae345b24e331bf731c9d5fa6455ac8e79bd6ec5d0d0

    • SHA512

      51c9b720c0a3e04d32e222b63a68e47accd3732992391897ed4db80b7160dab4cb72c150de185bc0b005878107fa556ba4a0154ff18c83e212b12aef9d847325

    • SSDEEP

      6144:6ZLwyyyWMa3NIBkL6LDW8dTZdw702edvxiuYOO6umz4N:6ZLwyyyHadIBkLIi8dTL2SvguYOO1mkN

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

    • Blocklisted process makes network request

MITRE ATT&CK Matrix

Tasks