General

  • Target

    47df7e8be520fd014563336dd7e273edb8500a696afefff5c793321e30514387

  • Size

    79KB

  • Sample

    210324-drq14thake

  • MD5

    8d3fab261408970b970b5b33c4d12f8c

  • SHA1

    a80f3d2280fdbf9500ade3bd9c996d51424f75bb

  • SHA256

    47df7e8be520fd014563336dd7e273edb8500a696afefff5c793321e30514387

  • SHA512

    4ad975d3b3514291207a5b21c0a5eb9dce8541799798892781923b093c6f7d6c0c9bb57cc5e4d161bb925919703d6713bcb9d0ddc2d7b8bed8c0640976e77434

Malware Config

Extracted

Family

icedid

Campaign

1211238709

C2

912caporers.fun

Targets

    • Target

      47df7e8be520fd014563336dd7e273edb8500a696afefff5c793321e30514387

    • Size

      79KB

    • MD5

      8d3fab261408970b970b5b33c4d12f8c

    • SHA1

      a80f3d2280fdbf9500ade3bd9c996d51424f75bb

    • SHA256

      47df7e8be520fd014563336dd7e273edb8500a696afefff5c793321e30514387

    • SHA512

      4ad975d3b3514291207a5b21c0a5eb9dce8541799798892781923b093c6f7d6c0c9bb57cc5e4d161bb925919703d6713bcb9d0ddc2d7b8bed8c0640976e77434

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

MITRE ATT&CK Matrix

Tasks