General

  • Target

    d797e43f1c9db3f5f7cd24d1c05872a1.dll

  • Size

    52KB

  • Sample

    210324-y1lcbkpyss

  • MD5

    d797e43f1c9db3f5f7cd24d1c05872a1

  • SHA1

    f0aa9e8c7a3cf6aab3e7951db678777bd1bb44cc

  • SHA256

    7c526db6e7f58403e3329453724a0ceb3fb45d0650d0190e8af1d0073b28703e

  • SHA512

    08d772b2fd117eda8223d42e2c1aaa68158cdde93de4384215ad2f8622b476db1bb61d21e9518b9113488749ac8ccfd35a52c5da1e059babe702b9edaca0cd6d

Malware Config

Extracted

Family

icedid

Campaign

1211238709

C2

feaser2347.club

Targets

    • Target

      d797e43f1c9db3f5f7cd24d1c05872a1.dll

    • Size

      52KB

    • MD5

      d797e43f1c9db3f5f7cd24d1c05872a1

    • SHA1

      f0aa9e8c7a3cf6aab3e7951db678777bd1bb44cc

    • SHA256

      7c526db6e7f58403e3329453724a0ceb3fb45d0650d0190e8af1d0073b28703e

    • SHA512

      08d772b2fd117eda8223d42e2c1aaa68158cdde93de4384215ad2f8622b476db1bb61d21e9518b9113488749ac8ccfd35a52c5da1e059babe702b9edaca0cd6d

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

MITRE ATT&CK Matrix

Tasks