General

  • Target

    ff734fe39dbcfde88977691062d0a6c17385424c3dd8b4ddeb475368d2cb7205

  • Size

    429KB

  • Sample

    210604-qje3c61xlj

  • MD5

    31a5457f8489684515aca714b2305570

  • SHA1

    c9ee56173f91ff7376a41246547ba9b78d92334f

  • SHA256

    ff734fe39dbcfde88977691062d0a6c17385424c3dd8b4ddeb475368d2cb7205

  • SHA512

    2d4cf4a13ecdc3bd243c8451d4c82e37af807d0f4bf0d1920f1e2765105752ea2f2964a76ee5a93a6de6103422f11574e504dd05415722b17ed9e727035474e3

Malware Config

Extracted

Family

icedid

Campaign

548569227

C2

buzzinmaster.live

Targets

    • Target

      ff734fe39dbcfde88977691062d0a6c17385424c3dd8b4ddeb475368d2cb7205

    • Size

      429KB

    • MD5

      31a5457f8489684515aca714b2305570

    • SHA1

      c9ee56173f91ff7376a41246547ba9b78d92334f

    • SHA256

      ff734fe39dbcfde88977691062d0a6c17385424c3dd8b4ddeb475368d2cb7205

    • SHA512

      2d4cf4a13ecdc3bd243c8451d4c82e37af807d0f4bf0d1920f1e2765105752ea2f2964a76ee5a93a6de6103422f11574e504dd05415722b17ed9e727035474e3

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Suspicious use of NtCreateProcessExOtherParentProcess

MITRE ATT&CK Matrix

Tasks