General

  • Target

    loadfsc.dll

  • Size

    578KB

  • Sample

    220219-jzg6vsafhj

  • MD5

    602d1f74d126ae0487f8980995d7a5b1

  • SHA1

    54c6c967c5ba6ff12a56c8298daaf84b663d409d

  • SHA256

    fdae004e66cf3dee59380f06e27f286fc5772ce658c9e1765867c07a6fdd131b

  • SHA512

    aad47da85168facef8b3ee19e795497c9db9914d57db79dd5462883677613c4d41c9697ce9f687dd8e2bdfe64b162a7387fbbd5fe721fb0cc4dcd08ed26fada5

Malware Config

Extracted

Family

icedid

Campaign

412701809

C2

hdtrenity.com

Targets

    • Target

      loadfsc.dll

    • Size

      578KB

    • MD5

      602d1f74d126ae0487f8980995d7a5b1

    • SHA1

      54c6c967c5ba6ff12a56c8298daaf84b663d409d

    • SHA256

      fdae004e66cf3dee59380f06e27f286fc5772ce658c9e1765867c07a6fdd131b

    • SHA512

      aad47da85168facef8b3ee19e795497c9db9914d57db79dd5462883677613c4d41c9697ce9f687dd8e2bdfe64b162a7387fbbd5fe721fb0cc4dcd08ed26fada5

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • suricata: ET MALWARE Win32/IcedID Request Cookie

      suricata: ET MALWARE Win32/IcedID Request Cookie

MITRE ATT&CK Matrix

Tasks