General

  • Target

    a151432dc9fedfbbe91e355cf796cf2efbbc7a401f0ac5c1da42e9a935327a05

  • Size

    198KB

  • Sample

    210401-mcsazffgve

  • MD5

    4d0ec53152d361fd9304f8be73a713c4

  • SHA1

    f148647e3c2674863ca1d7acfff65273e13bad07

  • SHA256

    a151432dc9fedfbbe91e355cf796cf2efbbc7a401f0ac5c1da42e9a935327a05

  • SHA512

    40f70f789b6eefd7ed22a39ca4fc31e817ce089574ef6c7583a1663e317f7930de5332b1cbc59c8dd106c858f3fc909c59e142511e6edbe4a3ccefd42342edd4

Malware Config

Extracted

Family

icedid

Campaign

1584008337

C2

secondpilots.space

Targets

    • Target

      a151432dc9fedfbbe91e355cf796cf2efbbc7a401f0ac5c1da42e9a935327a05

    • Size

      198KB

    • MD5

      4d0ec53152d361fd9304f8be73a713c4

    • SHA1

      f148647e3c2674863ca1d7acfff65273e13bad07

    • SHA256

      a151432dc9fedfbbe91e355cf796cf2efbbc7a401f0ac5c1da42e9a935327a05

    • SHA512

      40f70f789b6eefd7ed22a39ca4fc31e817ce089574ef6c7583a1663e317f7930de5332b1cbc59c8dd106c858f3fc909c59e142511e6edbe4a3ccefd42342edd4

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

MITRE ATT&CK Matrix

Tasks