General

  • Target

    0ea23c04461274b7afba4b2f38842ea9cecd34d10895fab9a0260d63d894ce73

  • Size

    79KB

  • Sample

    210324-y6pfkmbpw2

  • MD5

    f38782cef2ae096cfe039fb3539096fe

  • SHA1

    70526a6657cde5e24839cc249e1ebde581ddc64a

  • SHA256

    0ea23c04461274b7afba4b2f38842ea9cecd34d10895fab9a0260d63d894ce73

  • SHA512

    d866f737b9640071e24b700afc614c3630a294c5be7142cc707fd6fd7eb48e7366f85a4bcaa988665a7997d85b5e221c9f33eeadf1e79fd5d1d2cb5aab9b708d

Malware Config

Extracted

Family

icedid

Campaign

1211238709

C2

912caporers.fun

Targets

    • Target

      0ea23c04461274b7afba4b2f38842ea9cecd34d10895fab9a0260d63d894ce73

    • Size

      79KB

    • MD5

      f38782cef2ae096cfe039fb3539096fe

    • SHA1

      70526a6657cde5e24839cc249e1ebde581ddc64a

    • SHA256

      0ea23c04461274b7afba4b2f38842ea9cecd34d10895fab9a0260d63d894ce73

    • SHA512

      d866f737b9640071e24b700afc614c3630a294c5be7142cc707fd6fd7eb48e7366f85a4bcaa988665a7997d85b5e221c9f33eeadf1e79fd5d1d2cb5aab9b708d

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

MITRE ATT&CK Matrix

Tasks