General

  • Target

    97f89d609ff2f9da6d4d68ea6459fe4b0b0ae871f3761233605eb421749dd149

  • Size

    220KB

  • Sample

    201114-kprj8b3r52

  • MD5

    0885317903afd7cf9f2449b816283602

  • SHA1

    c739b51aa7d271cc0fcf685774e9ff235d8ffb08

  • SHA256

    97f89d609ff2f9da6d4d68ea6459fe4b0b0ae871f3761233605eb421749dd149

  • SHA512

    ef377f2a63cbfc717afb283795a26bdee1c629b18cbdb30a89544f85985076dd10d81bc722cc0f0783708d86589d28d198a2b3997d8276054e515aaea14e6d9d

Malware Config

Extracted

Family

icedid

C2

firstcovo.pw

kilohardtostop.pw

dalobecu.xyz

googmusi.cyou

Targets

    • Target

      97f89d609ff2f9da6d4d68ea6459fe4b0b0ae871f3761233605eb421749dd149

    • Size

      220KB

    • MD5

      0885317903afd7cf9f2449b816283602

    • SHA1

      c739b51aa7d271cc0fcf685774e9ff235d8ffb08

    • SHA256

      97f89d609ff2f9da6d4d68ea6459fe4b0b0ae871f3761233605eb421749dd149

    • SHA512

      ef377f2a63cbfc717afb283795a26bdee1c629b18cbdb30a89544f85985076dd10d81bc722cc0f0783708d86589d28d198a2b3997d8276054e515aaea14e6d9d

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID Core Payload

    • IcedID Second Stage Loader

MITRE ATT&CK Matrix

Tasks