General

  • Target

    e10a74c623d0f4eb378348ddf9499f710b51c4c246f0aec530a5e6efdc59873e

  • Size

    79KB

  • Sample

    210324-ee7fdxwer2

  • MD5

    c183447fe15db727bedccdbc2737a09a

  • SHA1

    940c76dd5f9e6844fb2531ea66b4875d752cbf7b

  • SHA256

    e10a74c623d0f4eb378348ddf9499f710b51c4c246f0aec530a5e6efdc59873e

  • SHA512

    0f1396318443335a96bb48796f2310041ec418beca71bdffd08ee8da46f2f0cbcb307d9f76bc2e565a8abd4caae20961382094a3960bbb6808119f3aa8b41068

Malware Config

Extracted

Family

icedid

Campaign

1211238709

C2

912caporers.fun

Targets

    • Target

      e10a74c623d0f4eb378348ddf9499f710b51c4c246f0aec530a5e6efdc59873e

    • Size

      79KB

    • MD5

      c183447fe15db727bedccdbc2737a09a

    • SHA1

      940c76dd5f9e6844fb2531ea66b4875d752cbf7b

    • SHA256

      e10a74c623d0f4eb378348ddf9499f710b51c4c246f0aec530a5e6efdc59873e

    • SHA512

      0f1396318443335a96bb48796f2310041ec418beca71bdffd08ee8da46f2f0cbcb307d9f76bc2e565a8abd4caae20961382094a3960bbb6808119f3aa8b41068

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

MITRE ATT&CK Matrix

Tasks