General

  • Target

    5061c63ea1082d612eb7fe041e0593c2.dll

  • Size

    52KB

  • Sample

    210324-p5vb9js92a

  • MD5

    5061c63ea1082d612eb7fe041e0593c2

  • SHA1

    ec2922165ee1ff3a8d25da65eaed586068af59e9

  • SHA256

    299a95b13d8dfdafe8beb958c40ff9a2d76b369b6adf59cad000bcaf94d04616

  • SHA512

    e40bf03b46124baa61c0cf4046165d2c6542791e231301727b1da2507bbaed8f29494bf23172c68356c1dd0bbf14298f6ec11b4eb0f87247d254be8187f1d373

Malware Config

Extracted

Family

icedid

Campaign

1211238709

C2

feaser2347.club

Targets

    • Target

      5061c63ea1082d612eb7fe041e0593c2.dll

    • Size

      52KB

    • MD5

      5061c63ea1082d612eb7fe041e0593c2

    • SHA1

      ec2922165ee1ff3a8d25da65eaed586068af59e9

    • SHA256

      299a95b13d8dfdafe8beb958c40ff9a2d76b369b6adf59cad000bcaf94d04616

    • SHA512

      e40bf03b46124baa61c0cf4046165d2c6542791e231301727b1da2507bbaed8f29494bf23172c68356c1dd0bbf14298f6ec11b4eb0f87247d254be8187f1d373

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

MITRE ATT&CK Matrix

Tasks