General

  • Target

    1f275cc030fc3f46a110063f2235af8b47285d80b8ad4.dll

  • Size

    52KB

  • Sample

    210324-ndt52jp7rj

  • MD5

    2564d119818fd65b8230b71854820fe8

  • SHA1

    f24b23c44629cead32ec4dc7bbba5f59100a8e9b

  • SHA256

    1f275cc030fc3f46a110063f2235af8b47285d80b8ad47eeb3970541b1af95db

  • SHA512

    b164c04de10d000e8c0b0738612a870a9014602fc032a16bb7fef643bb56c0dcffbe8950824c0fb5e0e594665f511079b9fe7103b786a71a76b8b6647014753d

Malware Config

Extracted

Family

icedid

Campaign

1211238709

C2

feaser2347.club

Targets

    • Target

      1f275cc030fc3f46a110063f2235af8b47285d80b8ad4.dll

    • Size

      52KB

    • MD5

      2564d119818fd65b8230b71854820fe8

    • SHA1

      f24b23c44629cead32ec4dc7bbba5f59100a8e9b

    • SHA256

      1f275cc030fc3f46a110063f2235af8b47285d80b8ad47eeb3970541b1af95db

    • SHA512

      b164c04de10d000e8c0b0738612a870a9014602fc032a16bb7fef643bb56c0dcffbe8950824c0fb5e0e594665f511079b9fe7103b786a71a76b8b6647014753d

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

MITRE ATT&CK Matrix

Tasks