General

  • Target

    99011744097f00273285be391363bf68107fcb70e26734aab9158d6ce41b5553

  • Size

    70KB

  • Sample

    220113-pzx5zaabd8

  • MD5

    ad3cee699e138a4adda5ccdcfc48a58a

  • SHA1

    129acb764ef35193601cb834ca8d158053453f70

  • SHA256

    99011744097f00273285be391363bf68107fcb70e26734aab9158d6ce41b5553

  • SHA512

    2d976fb680342cbbc2389acc346cc82e2ec1d93b285c276ba0eacf89cc9d1b3ae18b722f667a6d792caa97a964819d99e114d088ab7ecd461f5b687898ef6854

Malware Config

Extracted

Family

icedid

Campaign

497724135

C2

ovedfromasi.top

Targets

    • Target

      99011744097f00273285be391363bf68107fcb70e26734aab9158d6ce41b5553

    • Size

      70KB

    • MD5

      ad3cee699e138a4adda5ccdcfc48a58a

    • SHA1

      129acb764ef35193601cb834ca8d158053453f70

    • SHA256

      99011744097f00273285be391363bf68107fcb70e26734aab9158d6ce41b5553

    • SHA512

      2d976fb680342cbbc2389acc346cc82e2ec1d93b285c276ba0eacf89cc9d1b3ae18b722f667a6d792caa97a964819d99e114d088ab7ecd461f5b687898ef6854

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Loads dropped DLL

MITRE ATT&CK Enterprise v6

Tasks