General

  • Target

    2d1655895c0dde4bc010c51b9b878c46.dll

  • Size

    570KB

  • Sample

    220219-wpq28sbeh3

  • MD5

    2d1655895c0dde4bc010c51b9b878c46

  • SHA1

    fb73914210b56c020a816325b3a5adb185e8f3ee

  • SHA256

    0f5fbad82dae02e2a48775762f8ff0eb067eb4f81ce637607ac893d4e0c613b3

  • SHA512

    08947de9e604fde5ef451302ba0591999aa864f96577986cdeebe2f9325e2f936940deb413bf872c94e9007c9997fd036f25a30208f763cfd163860b624aeed1

Malware Config

Extracted

Family

icedid

Campaign

1117948791

C2

reseptors.com

Targets

    • Target

      2d1655895c0dde4bc010c51b9b878c46.dll

    • Size

      570KB

    • MD5

      2d1655895c0dde4bc010c51b9b878c46

    • SHA1

      fb73914210b56c020a816325b3a5adb185e8f3ee

    • SHA256

      0f5fbad82dae02e2a48775762f8ff0eb067eb4f81ce637607ac893d4e0c613b3

    • SHA512

      08947de9e604fde5ef451302ba0591999aa864f96577986cdeebe2f9325e2f936940deb413bf872c94e9007c9997fd036f25a30208f763cfd163860b624aeed1

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

MITRE ATT&CK Matrix

Tasks