General

  • Target

    f21b25706fe1fb021e89a46338b615450ad6bed649d11.dll

  • Size

    198KB

  • Sample

    210401-gtwlffppsj

  • MD5

    e08be168d5f3cf8f9f130babb9ffaf45

  • SHA1

    ff3390df55e48d7643a6ae307ca0b44843ce9266

  • SHA256

    f21b25706fe1fb021e89a46338b615450ad6bed649d1166397dd69e49207af53

  • SHA512

    717c8c7cfad929b8b6eb6fc53962469cd8d4ecd3bcdca4fb1d2c28d27681abeadaaa41168c7e05d89c4c54377cdca9b9e3ff48b1391b27bd3670634c9ec002ba

Malware Config

Extracted

Family

icedid

Campaign

1584008337

C2

secondpilots.space

Targets

    • Target

      f21b25706fe1fb021e89a46338b615450ad6bed649d11.dll

    • Size

      198KB

    • MD5

      e08be168d5f3cf8f9f130babb9ffaf45

    • SHA1

      ff3390df55e48d7643a6ae307ca0b44843ce9266

    • SHA256

      f21b25706fe1fb021e89a46338b615450ad6bed649d1166397dd69e49207af53

    • SHA512

      717c8c7cfad929b8b6eb6fc53962469cd8d4ecd3bcdca4fb1d2c28d27681abeadaaa41168c7e05d89c4c54377cdca9b9e3ff48b1391b27bd3670634c9ec002ba

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

MITRE ATT&CK Matrix

Tasks