General

  • Target

    145440a7c1067bacfcd4d07078040b67c3753e589501b.dll

  • Size

    198KB

  • Sample

    210401-sksjg4mmqs

  • MD5

    2d26d8d47581bcdf0008798c5650df5d

  • SHA1

    756c08c5b9622f1faa5c089296379ea5cdcb6e83

  • SHA256

    145440a7c1067bacfcd4d07078040b67c3753e589501bf6f78b970e72c450653

  • SHA512

    98128c9389909698648775680b6b2ea695b0a10855209d04287f3efa32c6b290f2f876a8a99ba6ba7bcabfc37182ee43ffc36b046cb5e39dbfff9c207a9c1e30

Malware Config

Extracted

Family

icedid

Campaign

1584008337

C2

secondpilots.space

Targets

    • Target

      145440a7c1067bacfcd4d07078040b67c3753e589501b.dll

    • Size

      198KB

    • MD5

      2d26d8d47581bcdf0008798c5650df5d

    • SHA1

      756c08c5b9622f1faa5c089296379ea5cdcb6e83

    • SHA256

      145440a7c1067bacfcd4d07078040b67c3753e589501bf6f78b970e72c450653

    • SHA512

      98128c9389909698648775680b6b2ea695b0a10855209d04287f3efa32c6b290f2f876a8a99ba6ba7bcabfc37182ee43ffc36b046cb5e39dbfff9c207a9c1e30

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

MITRE ATT&CK Matrix

Tasks