General

  • Target

    5314799090171904.zip

  • Size

    33KB

  • Sample

    211111-t5p4rsggfj

  • MD5

    34f6286f067462791976fc3b759f17c8

  • SHA1

    1c1f6eac188d1aa15cb12a869670998286b8a710

  • SHA256

    4867d16b596ca1ff41e0845d2086f87507917be2779abb7c0dd77e078e3ea66a

  • SHA512

    e7c1633fedb12092d6e780a444678a6eff4f58152f1bc4a62817d61a84912c1ae8fb1d5947494fb5aa08631043ad8de31bca43640839cbbd465316a8ea726267

Malware Config

Extracted

Family

icedid

Campaign

3055572094

C2

actuallyobligat.ink

Targets

    • Target

      f5d8d8d0235b9b71e88297f00acf6ea2277b1e8662a7fa8d17c1a6c535f9e351

    • Size

      82KB

    • MD5

      c6d828d2dbb3bce4e2e9b8da097aed49

    • SHA1

      8240e681a6e5836d8961c9e8ec72f4bacec6d685

    • SHA256

      f5d8d8d0235b9b71e88297f00acf6ea2277b1e8662a7fa8d17c1a6c535f9e351

    • SHA512

      61026e0d8d3bde40fc54b4a7fb701afe032a392d5aa0bac539ca9f6fb2eba5ddebbb1e295284ddb397ecda76ecb279bc8cde1949c346445b1eb5a54fb3b3679d

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • suricata: ET MALWARE Win32/IcedID Request Cookie

      suricata: ET MALWARE Win32/IcedID Request Cookie

MITRE ATT&CK Matrix

Tasks