General

  • Target

    hostsvc.dll

  • Size

    63KB

  • Sample

    210406-5bgafmrjzx

  • MD5

    fcb6cf720c45b554c5f689fa914ffd2c

  • SHA1

    4d247be7e4c3ee51c026c49dc4b9f59479e8ca77

  • SHA256

    ca93e1c7dc98ca126438c4772f9c3377de5f628b612fe3dc8f72709d5e5bbdb0

  • SHA512

    a27fb5b32662f0624be8b96aaab8e8b09933dee0c996009970d8f7348d5df2142eb23f9215c35c95640a767399dce4636122dc81e58b5cc15ff3ffa3a6a86514

Malware Config

Extracted

Family

icedid

Campaign

2608516171

C2

234willkids.uno

Extracted

Family

icedid

rsa_pubkey.plain

Extracted

Family

icedid

Botnet

478101429

C2

gabry4saver.website

usser234dopper.space

tasyateles.club

jrburnit.website

Attributes
  • url_path

    /news/

Targets

    • Target

      hostsvc.dll

    • Size

      63KB

    • MD5

      fcb6cf720c45b554c5f689fa914ffd2c

    • SHA1

      4d247be7e4c3ee51c026c49dc4b9f59479e8ca77

    • SHA256

      ca93e1c7dc98ca126438c4772f9c3377de5f628b612fe3dc8f72709d5e5bbdb0

    • SHA512

      a27fb5b32662f0624be8b96aaab8e8b09933dee0c996009970d8f7348d5df2142eb23f9215c35c95640a767399dce4636122dc81e58b5cc15ff3ffa3a6a86514

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks