General

  • Target

    d13ae2121af3bc78790d5191c543c7b.exe

  • Size

    65KB

  • Sample

    211021-lgrnpaaah3

  • MD5

    d13ae2121af3bc78790d5191c543c7b3

  • SHA1

    4096d8c93f1bb01dfd4871bb8fffb5b0e59832c9

  • SHA256

    9e2d1466480a6265cb65de5f2bca7971c5fe3aa5fdb3c6d78a0595ba413f10a1

  • SHA512

    13dc335a17880453f826d878bb3674463dac25fb64cff3e7b678cfba58771b2c76376d6c0d4e4f61da7a542f98620d398184af265f5daca41648d81282051742

Malware Config

Extracted

Family

icedid

Campaign

3717128962

C2

usaaforced.fun

Targets

    • Target

      d13ae2121af3bc78790d5191c543c7b.exe

    • Size

      65KB

    • MD5

      d13ae2121af3bc78790d5191c543c7b3

    • SHA1

      4096d8c93f1bb01dfd4871bb8fffb5b0e59832c9

    • SHA256

      9e2d1466480a6265cb65de5f2bca7971c5fe3aa5fdb3c6d78a0595ba413f10a1

    • SHA512

      13dc335a17880453f826d878bb3674463dac25fb64cff3e7b678cfba58771b2c76376d6c0d4e4f61da7a542f98620d398184af265f5daca41648d81282051742

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

MITRE ATT&CK Matrix

Tasks