General

  • Target

    477183deeace02f1fb13a8fa5452e6d65c5bd65d124b02d4fc73e05bc34b6711

  • Size

    198KB

  • Sample

    210401-33pv63mn5x

  • MD5

    e16cdf6cf40cf77371c3f094b08bfbf8

  • SHA1

    bb20205a463d10c0e6f32c2c52a9d3762c60d3e3

  • SHA256

    477183deeace02f1fb13a8fa5452e6d65c5bd65d124b02d4fc73e05bc34b6711

  • SHA512

    398d1021397ca10c786e218547da2920bc42c7a9ecb49911b3d59138c9324433750b1c3c58de6fe6c387d1ff1acd62053125bdf0e09e55e7ce3f4ca62aefe462

Malware Config

Extracted

Family

icedid

Campaign

1584008337

C2

secondpilots.space

Targets

    • Target

      477183deeace02f1fb13a8fa5452e6d65c5bd65d124b02d4fc73e05bc34b6711

    • Size

      198KB

    • MD5

      e16cdf6cf40cf77371c3f094b08bfbf8

    • SHA1

      bb20205a463d10c0e6f32c2c52a9d3762c60d3e3

    • SHA256

      477183deeace02f1fb13a8fa5452e6d65c5bd65d124b02d4fc73e05bc34b6711

    • SHA512

      398d1021397ca10c786e218547da2920bc42c7a9ecb49911b3d59138c9324433750b1c3c58de6fe6c387d1ff1acd62053125bdf0e09e55e7ce3f4ca62aefe462

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

MITRE ATT&CK Matrix

Tasks