General

  • Target

    e12edc89dd5c4026d176887872c6dfd8.dll

  • Size

    52KB

  • Sample

    210324-gxhzclel7n

  • MD5

    e12edc89dd5c4026d176887872c6dfd8

  • SHA1

    22cb0fc4cc43deba7b541c244ff880dd10c86b72

  • SHA256

    56a6c5b5a624e1787b9f5242055e808602e2767c0b34e9366d4b9079393e1e09

  • SHA512

    98cc1b7a5ef0193b4232dcd20c185a316a68eb14b872e26fb0021b6e2cbb5b66570b9cab34e006afcd8ecb6ddd04ec4001303a19ed69d12ff6d45e2e1c2dd297

Malware Config

Extracted

Family

icedid

Campaign

1211238709

C2

feaser2347.club

Targets

    • Target

      e12edc89dd5c4026d176887872c6dfd8.dll

    • Size

      52KB

    • MD5

      e12edc89dd5c4026d176887872c6dfd8

    • SHA1

      22cb0fc4cc43deba7b541c244ff880dd10c86b72

    • SHA256

      56a6c5b5a624e1787b9f5242055e808602e2767c0b34e9366d4b9079393e1e09

    • SHA512

      98cc1b7a5ef0193b4232dcd20c185a316a68eb14b872e26fb0021b6e2cbb5b66570b9cab34e006afcd8ecb6ddd04ec4001303a19ed69d12ff6d45e2e1c2dd297

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

MITRE ATT&CK Matrix

Tasks