General

  • Target

    4ef677c654df9845d922634392bb0d4d.dll

  • Size

    79KB

  • Sample

    210324-aj8kybfgln

  • MD5

    4ef677c654df9845d922634392bb0d4d

  • SHA1

    92120e70e02eb6c5b2dd609487e4dce5f276988e

  • SHA256

    4dc9ad94952e28c4e9df30a75a8e434ee1c53cddba6782ac27739ead877fa9eb

  • SHA512

    dd34720c488426a2e30d62836d7e4e3ded414c09431bec521691c901bae2e24795b108eb73924c66dbf5e57305f0b850882725d8dff5bf4051328476eb6213bf

Malware Config

Extracted

Family

icedid

Campaign

1211238709

C2

912caporers.fun

Targets

    • Target

      4ef677c654df9845d922634392bb0d4d.dll

    • Size

      79KB

    • MD5

      4ef677c654df9845d922634392bb0d4d

    • SHA1

      92120e70e02eb6c5b2dd609487e4dce5f276988e

    • SHA256

      4dc9ad94952e28c4e9df30a75a8e434ee1c53cddba6782ac27739ead877fa9eb

    • SHA512

      dd34720c488426a2e30d62836d7e4e3ded414c09431bec521691c901bae2e24795b108eb73924c66dbf5e57305f0b850882725d8dff5bf4051328476eb6213bf

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

MITRE ATT&CK Matrix

Tasks