General

  • Target

    5264623f5d44ca9a2ff057eb5ca58fefa48b0cc7a0b31f7fd13eb103b3314376

  • Size

    198KB

  • Sample

    210401-cq43bb6xn6

  • MD5

    fc032140a0e8c90fd81041cde44acdec

  • SHA1

    630408c1b09fc6b1af1c475d95951260df4bdfc9

  • SHA256

    5264623f5d44ca9a2ff057eb5ca58fefa48b0cc7a0b31f7fd13eb103b3314376

  • SHA512

    6bca07d59ea1e77b535eea62b18052540f7ad8b7dabf703fae1dd3408edcdf11ef69a9374fca60064f951dbaa8f10dd0949c596654e6cb4b20daadb26cc991c8

Malware Config

Extracted

Family

icedid

Campaign

1584008337

C2

secondpilots.space

Targets

    • Target

      5264623f5d44ca9a2ff057eb5ca58fefa48b0cc7a0b31f7fd13eb103b3314376

    • Size

      198KB

    • MD5

      fc032140a0e8c90fd81041cde44acdec

    • SHA1

      630408c1b09fc6b1af1c475d95951260df4bdfc9

    • SHA256

      5264623f5d44ca9a2ff057eb5ca58fefa48b0cc7a0b31f7fd13eb103b3314376

    • SHA512

      6bca07d59ea1e77b535eea62b18052540f7ad8b7dabf703fae1dd3408edcdf11ef69a9374fca60064f951dbaa8f10dd0949c596654e6cb4b20daadb26cc991c8

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

MITRE ATT&CK Matrix

Tasks