General

  • Target

    e12a6841c7c44aa23530e348c6768d74a817e9c101e37907ed8956d392011a36

  • Size

    86KB

  • Sample

    210505-k542nswhne

  • MD5

    f6cbdf9232d177bbfa27bcd8d464379d

  • SHA1

    935e7713d6a2c51125e1035188cef4e1e052608e

  • SHA256

    e12a6841c7c44aa23530e348c6768d74a817e9c101e37907ed8956d392011a36

  • SHA512

    fcd03923cdbf330aabe5fc7de48e98b46258978095ed0e6bc0494d04da1d696637037a6e50e949e88d19e039466ba505170646b1aa569b881f96d04a4091f30d

Malware Config

Extracted

Family

icedid

Campaign

3717128962

C2

usaaforced.fun

Targets

    • Target

      e12a6841c7c44aa23530e348c6768d74a817e9c101e37907ed8956d392011a36

    • Size

      86KB

    • MD5

      f6cbdf9232d177bbfa27bcd8d464379d

    • SHA1

      935e7713d6a2c51125e1035188cef4e1e052608e

    • SHA256

      e12a6841c7c44aa23530e348c6768d74a817e9c101e37907ed8956d392011a36

    • SHA512

      fcd03923cdbf330aabe5fc7de48e98b46258978095ed0e6bc0494d04da1d696637037a6e50e949e88d19e039466ba505170646b1aa569b881f96d04a4091f30d

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

MITRE ATT&CK Matrix

Tasks