General

  • Target

    d0e1699bf9ee9e7eaf123df5fac98aeed2d3e104f939bf5e74c61ad18b79a940

  • Size

    46KB

  • Sample

    210505-yv5s9ym8ye

  • MD5

    844922394b66b46bda4d4be6d352fc84

  • SHA1

    7cc05e2ef77e2ae26c80202a039aac1d78a3e4a1

  • SHA256

    d0e1699bf9ee9e7eaf123df5fac98aeed2d3e104f939bf5e74c61ad18b79a940

  • SHA512

    d3ed612964f85dbb447a58a96f414c3f6404a3bf034b34b8e91eb33ed9867acdf1cd1ed19bf0e879273e692f25a79eb5e3d71a1705cca5cb30273c181f2f9797

Malware Config

Extracted

Family

icedid

Campaign

3717128962

C2

usaaforced.fun

Targets

    • Target

      d0e1699bf9ee9e7eaf123df5fac98aeed2d3e104f939bf5e74c61ad18b79a940

    • Size

      46KB

    • MD5

      844922394b66b46bda4d4be6d352fc84

    • SHA1

      7cc05e2ef77e2ae26c80202a039aac1d78a3e4a1

    • SHA256

      d0e1699bf9ee9e7eaf123df5fac98aeed2d3e104f939bf5e74c61ad18b79a940

    • SHA512

      d3ed612964f85dbb447a58a96f414c3f6404a3bf034b34b8e91eb33ed9867acdf1cd1ed19bf0e879273e692f25a79eb5e3d71a1705cca5cb30273c181f2f9797

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

MITRE ATT&CK Matrix

Tasks