General

  • Target

    8929982d9f3d979174b880297e3fd2a81f359d6bf7ab0d47ec0207da8dfa7b72

  • Size

    409KB

  • Sample

    201109-laheybsjte

  • MD5

    1ab15c4f1e6d6ebb7ac973e65730ea47

  • SHA1

    66f368b0a24c30b3c89229e90c927d68a9670692

  • SHA256

    8929982d9f3d979174b880297e3fd2a81f359d6bf7ab0d47ec0207da8dfa7b72

  • SHA512

    b837fa6e727b45f1fe8aebab2ccd05ae1bdb396dfdb12894d2fe5773c1a84479386ac2243a760d0d1fae31420664124d128c15459ed4271cf57377c2fb2052ee

Malware Config

Extracted

Family

icedid

C2

boatliker.top

autofiller.top

Targets

    • Target

      8929982d9f3d979174b880297e3fd2a81f359d6bf7ab0d47ec0207da8dfa7b72

    • Size

      409KB

    • MD5

      1ab15c4f1e6d6ebb7ac973e65730ea47

    • SHA1

      66f368b0a24c30b3c89229e90c927d68a9670692

    • SHA256

      8929982d9f3d979174b880297e3fd2a81f359d6bf7ab0d47ec0207da8dfa7b72

    • SHA512

      b837fa6e727b45f1fe8aebab2ccd05ae1bdb396dfdb12894d2fe5773c1a84479386ac2243a760d0d1fae31420664124d128c15459ed4271cf57377c2fb2052ee

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID Core Payload

    • IcedID Second Stage Loader

MITRE ATT&CK Matrix

Tasks