General

  • Target

    2efeafdcfca03c83061d1ad399af84b48af2459610eb1a0b994b99383db5c2b0

  • Size

    79KB

  • Sample

    210324-428pyta866

  • MD5

    f422491c66fa2c7d9f43dfa0f6d2e144

  • SHA1

    e9d9bfab7dc8aa65c2740fe8902b10e3f0ac1ae4

  • SHA256

    2efeafdcfca03c83061d1ad399af84b48af2459610eb1a0b994b99383db5c2b0

  • SHA512

    3456195cc78dd07de2d6aac866c2a7dc461bd675ecc139de87b584d00a2746078039c9b402b780f6f49c69dffb0791fb28b1499f945adc2d2328a21a571dc064

Malware Config

Extracted

Family

icedid

Campaign

1211238709

C2

912caporers.fun

Targets

    • Target

      2efeafdcfca03c83061d1ad399af84b48af2459610eb1a0b994b99383db5c2b0

    • Size

      79KB

    • MD5

      f422491c66fa2c7d9f43dfa0f6d2e144

    • SHA1

      e9d9bfab7dc8aa65c2740fe8902b10e3f0ac1ae4

    • SHA256

      2efeafdcfca03c83061d1ad399af84b48af2459610eb1a0b994b99383db5c2b0

    • SHA512

      3456195cc78dd07de2d6aac866c2a7dc461bd675ecc139de87b584d00a2746078039c9b402b780f6f49c69dffb0791fb28b1499f945adc2d2328a21a571dc064

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

MITRE ATT&CK Matrix

Tasks