General

  • Target

    55646f4ba7f39ad76a8c9a0d5f145f91.dll

  • Size

    52KB

  • Sample

    210324-jlfw84dzs6

  • MD5

    55646f4ba7f39ad76a8c9a0d5f145f91

  • SHA1

    c95e94a91423ffb6bc31308c146884222803f089

  • SHA256

    a425526659e6aabfef8c10ed2015ca44bc6a521f4509b1e4deca68c67401d24b

  • SHA512

    769cb9f5236558f7082ffc04a7e849995027c1ecd4df1e85c281795f89797c6c104a921dbe182192797db30255253e8b64a08eab5cb7da6b274acc1a45298f30

Malware Config

Extracted

Family

icedid

Campaign

1211238709

C2

feaser2347.club

Targets

    • Target

      55646f4ba7f39ad76a8c9a0d5f145f91.dll

    • Size

      52KB

    • MD5

      55646f4ba7f39ad76a8c9a0d5f145f91

    • SHA1

      c95e94a91423ffb6bc31308c146884222803f089

    • SHA256

      a425526659e6aabfef8c10ed2015ca44bc6a521f4509b1e4deca68c67401d24b

    • SHA512

      769cb9f5236558f7082ffc04a7e849995027c1ecd4df1e85c281795f89797c6c104a921dbe182192797db30255253e8b64a08eab5cb7da6b274acc1a45298f30

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

MITRE ATT&CK Matrix

Tasks