General

  • Target

    5eb099f390e0532dc8324a9ab7f14838.dll

  • Size

    52KB

  • Sample

    210324-e2zlfzeh4n

  • MD5

    5eb099f390e0532dc8324a9ab7f14838

  • SHA1

    59a41f9766f13d81ec8b64a11b174718b140c9c1

  • SHA256

    9e7946b4535d5f4a91d20e72dffe21497306e74187c6dfb2f21d00e03e7e6b38

  • SHA512

    9f83549bf4c2b181acc6b93ee5574b0b7d3e63f058fa7142be36714233ae1fe5ffc7b42a3cdc649989edcf00402733b90053aa04ed290ed9fd84a9129a208bb5

Malware Config

Extracted

Family

icedid

Campaign

1211238709

C2

feaser2347.club

Targets

    • Target

      5eb099f390e0532dc8324a9ab7f14838.dll

    • Size

      52KB

    • MD5

      5eb099f390e0532dc8324a9ab7f14838

    • SHA1

      59a41f9766f13d81ec8b64a11b174718b140c9c1

    • SHA256

      9e7946b4535d5f4a91d20e72dffe21497306e74187c6dfb2f21d00e03e7e6b38

    • SHA512

      9f83549bf4c2b181acc6b93ee5574b0b7d3e63f058fa7142be36714233ae1fe5ffc7b42a3cdc649989edcf00402733b90053aa04ed290ed9fd84a9129a208bb5

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

MITRE ATT&CK Matrix

Tasks