General

  • Target

    eb5e4ec477af81210f43369ffa9ff16c4f402cd6277e8dc632e4936d216583c9

  • Size

    79KB

  • Sample

    210324-3nlj5g6d3j

  • MD5

    45f2ca1fb3efb4be07a510d2c66f6269

  • SHA1

    a3c1961f4cba014af07a310c761f04b2fc56bc8b

  • SHA256

    eb5e4ec477af81210f43369ffa9ff16c4f402cd6277e8dc632e4936d216583c9

  • SHA512

    c9edc7120324fbe7b82c49fca046472d95a1a1fccd8d841db149c63d0d438852a64564758d24a16707af796e4cd3064ce46e512c2154b8455ec07fcab69b50f4

Malware Config

Extracted

Family

icedid

Campaign

1211238709

C2

912caporers.fun

Targets

    • Target

      eb5e4ec477af81210f43369ffa9ff16c4f402cd6277e8dc632e4936d216583c9

    • Size

      79KB

    • MD5

      45f2ca1fb3efb4be07a510d2c66f6269

    • SHA1

      a3c1961f4cba014af07a310c761f04b2fc56bc8b

    • SHA256

      eb5e4ec477af81210f43369ffa9ff16c4f402cd6277e8dc632e4936d216583c9

    • SHA512

      c9edc7120324fbe7b82c49fca046472d95a1a1fccd8d841db149c63d0d438852a64564758d24a16707af796e4cd3064ce46e512c2154b8455ec07fcab69b50f4

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

MITRE ATT&CK Matrix

Tasks