General

  • Target

    de632fb144e61babcaeb9416f0d38b07b1c63faf4f5b7.dll

  • Size

    198KB

  • Sample

    210401-pkx4h63m9s

  • MD5

    1ec23732be191d0c404ca1017810de70

  • SHA1

    4211b6532ac929f74b77b442b88aeb94a4eacced

  • SHA256

    de632fb144e61babcaeb9416f0d38b07b1c63faf4f5b78e1e55a1e5d52a49042

  • SHA512

    34a09234699a0e402c34682c2ca6666f23f9449d5b4ed41bf43888686146edc0b2820ef41590024d58eac1dd914b1017df7809f69a9fa55c30b7e319f80fe532

Malware Config

Extracted

Family

icedid

Campaign

1584008337

C2

secondpilots.space

Targets

    • Target

      de632fb144e61babcaeb9416f0d38b07b1c63faf4f5b7.dll

    • Size

      198KB

    • MD5

      1ec23732be191d0c404ca1017810de70

    • SHA1

      4211b6532ac929f74b77b442b88aeb94a4eacced

    • SHA256

      de632fb144e61babcaeb9416f0d38b07b1c63faf4f5b78e1e55a1e5d52a49042

    • SHA512

      34a09234699a0e402c34682c2ca6666f23f9449d5b4ed41bf43888686146edc0b2820ef41590024d58eac1dd914b1017df7809f69a9fa55c30b7e319f80fe532

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

MITRE ATT&CK Matrix

Tasks