General

  • Target

    4a6ecab4c22a7a6d8ae800b1f9065e86fc2af51c6cb5729ae6a478476d336ef1

  • Size

    198KB

  • Sample

    210401-g2cx9w8bws

  • MD5

    44988e5de52d64d99dd0c92f1c36ce7b

  • SHA1

    b6681661ddbed3825c38b7fea3cca3be7441c2c2

  • SHA256

    4a6ecab4c22a7a6d8ae800b1f9065e86fc2af51c6cb5729ae6a478476d336ef1

  • SHA512

    ff286e227f12fc286c5149bce0e5f4cfb5d13d7aded70e39847d21c2f084c3872de2e80c204451998295b8cb7fc8cb1920567f2d1249e19949e0069f5a5016c9

Malware Config

Extracted

Family

icedid

Campaign

1584008337

C2

secondpilots.space

Targets

    • Target

      4a6ecab4c22a7a6d8ae800b1f9065e86fc2af51c6cb5729ae6a478476d336ef1

    • Size

      198KB

    • MD5

      44988e5de52d64d99dd0c92f1c36ce7b

    • SHA1

      b6681661ddbed3825c38b7fea3cca3be7441c2c2

    • SHA256

      4a6ecab4c22a7a6d8ae800b1f9065e86fc2af51c6cb5729ae6a478476d336ef1

    • SHA512

      ff286e227f12fc286c5149bce0e5f4cfb5d13d7aded70e39847d21c2f084c3872de2e80c204451998295b8cb7fc8cb1920567f2d1249e19949e0069f5a5016c9

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

MITRE ATT&CK Matrix

Tasks