General

  • Target

    5ce442da5edd63e8e2f437eecbed1272.zip

  • Size

    37KB

  • Sample

    210312-g2t9d1bean

  • MD5

    a91b24d238b10cb24e2c395153847f09

  • SHA1

    965262257cd4886ef966289ecb3570a177779420

  • SHA256

    c4d02ad6ccb00a4c3766bd85f3182bdf6515de80a4dbeb797bc3d843850e83b8

  • SHA512

    2a32f4125a6085732986408418ddada7c9fa112a78a8e53e8608a2503df6158e2d28e218698e66b6300c5710317be518d0b29adf65ea0572db71f2ec9ef817c3

Malware Config

Extracted

Family

icedid

Campaign

2292720537

C2

klicjop9.fun

Targets

    • Target

      5ce442da5edd63e8e2f437eecbed1272

    • Size

      154KB

    • MD5

      5ce442da5edd63e8e2f437eecbed1272

    • SHA1

      7304677ff1140a459764ba89492711314ea8ef5b

    • SHA256

      3cb641f49506bd13f2827ddb3cb1db2889e410f3fb5dc8517269a04f03b7f662

    • SHA512

      b085976ae5b3a8648d516715e9c586332ac98b753b9128aeed15b70c595bf10a4ce40170f5f08e575f9cc0fc4f2cfc8ee86968088644f55f30ff6370a3b2dfa5

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

MITRE ATT&CK Matrix

Tasks