General

  • Target

    d306a9e5b59891e8eced5b995b95922e7bbdb2db4ea2d.dll

  • Size

    198KB

  • Sample

    210401-vcfnw238n2

  • MD5

    e7cb3ca91b7eaf1e512d8717f73c9251

  • SHA1

    246be5925b81d3532ee11286f8548cbf1dcf8ffd

  • SHA256

    d306a9e5b59891e8eced5b995b95922e7bbdb2db4ea2db819349cf0d264843c1

  • SHA512

    48668197782ff603a4ee15dd7694728563dc72ddd97a44844e4e6fe4e49b9b62c26122894c641f642c2003d5eb21d37d64ae09cea19fc7da992a8dd145c52022

Malware Config

Extracted

Family

icedid

Campaign

1584008337

C2

secondpilots.space

Targets

    • Target

      d306a9e5b59891e8eced5b995b95922e7bbdb2db4ea2d.dll

    • Size

      198KB

    • MD5

      e7cb3ca91b7eaf1e512d8717f73c9251

    • SHA1

      246be5925b81d3532ee11286f8548cbf1dcf8ffd

    • SHA256

      d306a9e5b59891e8eced5b995b95922e7bbdb2db4ea2db819349cf0d264843c1

    • SHA512

      48668197782ff603a4ee15dd7694728563dc72ddd97a44844e4e6fe4e49b9b62c26122894c641f642c2003d5eb21d37d64ae09cea19fc7da992a8dd145c52022

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

MITRE ATT&CK Matrix

Tasks