General

  • Target

    cd4a11571af3d14a761c5fb8247cd441b9d8dc3d1459a.dll

  • Size

    198KB

  • Sample

    210401-qa66zmd77s

  • MD5

    5ebdd62f954f445ea2af2bf26ca0c5b9

  • SHA1

    2b64d441badae21dd5daae868e9496f7973d0b85

  • SHA256

    cd4a11571af3d14a761c5fb8247cd441b9d8dc3d1459a40226fc12c77757764e

  • SHA512

    4d02f72f590bbececbe906fba42a6d2a27832cb31a3529e84247c9e4b0f08dedc77682f7e16ace14679c0bf0cf4166720369fbe0edf6a0b8a8c06072c7d907d9

Malware Config

Extracted

Family

icedid

Campaign

1584008337

C2

secondpilots.space

Targets

    • Target

      cd4a11571af3d14a761c5fb8247cd441b9d8dc3d1459a.dll

    • Size

      198KB

    • MD5

      5ebdd62f954f445ea2af2bf26ca0c5b9

    • SHA1

      2b64d441badae21dd5daae868e9496f7973d0b85

    • SHA256

      cd4a11571af3d14a761c5fb8247cd441b9d8dc3d1459a40226fc12c77757764e

    • SHA512

      4d02f72f590bbececbe906fba42a6d2a27832cb31a3529e84247c9e4b0f08dedc77682f7e16ace14679c0bf0cf4166720369fbe0edf6a0b8a8c06072c7d907d9

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

MITRE ATT&CK Matrix

Tasks