General

  • Target

    ef0702e34c417023bcd1ce7e9f63f49ad29c46c1cc05c0bd63ef3d427345a24b

  • Size

    79KB

  • Sample

    210324-h4vgwxf4qj

  • MD5

    0fb74bf07ca749299b3d5a6e6e9150b7

  • SHA1

    e199e0410571b195b1e4b8e0123b0fd5069930d4

  • SHA256

    ef0702e34c417023bcd1ce7e9f63f49ad29c46c1cc05c0bd63ef3d427345a24b

  • SHA512

    e908101edb5e885f6ebdf148ba06ab0b5a63e547099184befaf57d6d486ae6666b2b2c71b8a511c71fe338f638bac295873f73ea423a412cd8d678d1b6841f58

Malware Config

Extracted

Family

icedid

Campaign

1211238709

C2

912caporers.fun

Targets

    • Target

      ef0702e34c417023bcd1ce7e9f63f49ad29c46c1cc05c0bd63ef3d427345a24b

    • Size

      79KB

    • MD5

      0fb74bf07ca749299b3d5a6e6e9150b7

    • SHA1

      e199e0410571b195b1e4b8e0123b0fd5069930d4

    • SHA256

      ef0702e34c417023bcd1ce7e9f63f49ad29c46c1cc05c0bd63ef3d427345a24b

    • SHA512

      e908101edb5e885f6ebdf148ba06ab0b5a63e547099184befaf57d6d486ae6666b2b2c71b8a511c71fe338f638bac295873f73ea423a412cd8d678d1b6841f58

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

MITRE ATT&CK Matrix

Tasks