General

  • Target

    17e8d92687f4274fc75cf77c2a571401b7c1fd29e3fa9.dll

  • Size

    79KB

  • Sample

    210324-1bqjadwrr6

  • MD5

    035dc493eaabdb0cdeafadfacbe192c1

  • SHA1

    b0d47193f9c52f791733d8f1a39a76379e105598

  • SHA256

    17e8d92687f4274fc75cf77c2a571401b7c1fd29e3fa9adf342fc9a3bf927715

  • SHA512

    f3bb0046b7753f84b5ce1a2440abdfe5c2919db11604801b891fff485fdb41de031cf338223a88075ba055de04ffc41463a57ecad6e06d2639a4b58ac1d61d59

Malware Config

Extracted

Family

icedid

Campaign

1211238709

C2

912caporers.fun

Targets

    • Target

      17e8d92687f4274fc75cf77c2a571401b7c1fd29e3fa9.dll

    • Size

      79KB

    • MD5

      035dc493eaabdb0cdeafadfacbe192c1

    • SHA1

      b0d47193f9c52f791733d8f1a39a76379e105598

    • SHA256

      17e8d92687f4274fc75cf77c2a571401b7c1fd29e3fa9adf342fc9a3bf927715

    • SHA512

      f3bb0046b7753f84b5ce1a2440abdfe5c2919db11604801b891fff485fdb41de031cf338223a88075ba055de04ffc41463a57ecad6e06d2639a4b58ac1d61d59

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

MITRE ATT&CK Matrix

Tasks