General

  • Target

    dbcfa46a6d9b1810a22cc3ffeb583d49.dll

  • Size

    98KB

  • Sample

    210506-f89cjxcpks

  • MD5

    dbcfa46a6d9b1810a22cc3ffeb583d49

  • SHA1

    d2f02cdb3204b32b4a0f4618ac48f2be92722828

  • SHA256

    babaf02a2ea4c03e9ea2bb01475757c9e39f96f71a9d7a76e722c64c0107c333

  • SHA512

    accf3cd48712db0f92729cb7e54e94f4e9635224c9049fd7c779246d847d983da8f6e86b6d031f0cf6cc650f73c89e75138010cc326fb31729105734fe90e48f

Malware Config

Extracted

Family

icedid

Campaign

3717128962

C2

usaaforced.fun

Targets

    • Target

      dbcfa46a6d9b1810a22cc3ffeb583d49.dll

    • Size

      98KB

    • MD5

      dbcfa46a6d9b1810a22cc3ffeb583d49

    • SHA1

      d2f02cdb3204b32b4a0f4618ac48f2be92722828

    • SHA256

      babaf02a2ea4c03e9ea2bb01475757c9e39f96f71a9d7a76e722c64c0107c333

    • SHA512

      accf3cd48712db0f92729cb7e54e94f4e9635224c9049fd7c779246d847d983da8f6e86b6d031f0cf6cc650f73c89e75138010cc326fb31729105734fe90e48f

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

MITRE ATT&CK Matrix

Tasks