General

  • Target

    ebe23f49.jpg

  • Size

    130KB

  • Sample

    201029-hwm8rpqmhx

  • MD5

    307baee7a6a0611d7fe8e0100f0c5004

  • SHA1

    df4454ee7b9bfe9cd139838b16b97e044b6ed0cb

  • SHA256

    8d4a19f6f6bea669bd04e5934f483d03a538dccc070a05269a8375315ae01562

  • SHA512

    9805d17c899c72a58217ed7fa84953f35e5a59f20d2f315c1583b4fe4c9bcde5b71e293c3e64a307686c290ad033182a616a759e7fd23c200f19e9e536d1a7e8

Malware Config

Extracted

Family

icedid

C2

stryjerefer.buzz

Targets

    • Target

      ebe23f49.jpg

    • Size

      130KB

    • MD5

      307baee7a6a0611d7fe8e0100f0c5004

    • SHA1

      df4454ee7b9bfe9cd139838b16b97e044b6ed0cb

    • SHA256

      8d4a19f6f6bea669bd04e5934f483d03a538dccc070a05269a8375315ae01562

    • SHA512

      9805d17c899c72a58217ed7fa84953f35e5a59f20d2f315c1583b4fe4c9bcde5b71e293c3e64a307686c290ad033182a616a759e7fd23c200f19e9e536d1a7e8

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

MITRE ATT&CK Matrix

Tasks