General

  • Target

    85e5f25c3ceb380f4bc8622c2fbcb41b2f8cbb469b87d.dll

  • Size

    198KB

  • Sample

    210401-9859bggsnx

  • MD5

    37c017a3f95cc4196e54aec5e2be9b3d

  • SHA1

    4068e1520cec172ea790d051726a4560e053915b

  • SHA256

    85e5f25c3ceb380f4bc8622c2fbcb41b2f8cbb469b87d0995e9446e0015d60e1

  • SHA512

    b8660f882ebd4498f9226b1e69576ede8c07bf010645749e6721b2aa82be015fb408abb8519e4a7dd304598faa226cfb7bda5eb79b93ab23c4bab7756efcd45f

Malware Config

Extracted

Family

icedid

Campaign

1584008337

C2

secondpilots.space

Targets

    • Target

      85e5f25c3ceb380f4bc8622c2fbcb41b2f8cbb469b87d.dll

    • Size

      198KB

    • MD5

      37c017a3f95cc4196e54aec5e2be9b3d

    • SHA1

      4068e1520cec172ea790d051726a4560e053915b

    • SHA256

      85e5f25c3ceb380f4bc8622c2fbcb41b2f8cbb469b87d0995e9446e0015d60e1

    • SHA512

      b8660f882ebd4498f9226b1e69576ede8c07bf010645749e6721b2aa82be015fb408abb8519e4a7dd304598faa226cfb7bda5eb79b93ab23c4bab7756efcd45f

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

MITRE ATT&CK Matrix

Tasks