General

  • Target

    076da05987d7b49eaf6a5ba599117839.dll

  • Size

    559KB

  • Sample

    220219-wpq28scegn

  • MD5

    076da05987d7b49eaf6a5ba599117839

  • SHA1

    ca04036a3c15b57dd89421b265705f01aaa10c5a

  • SHA256

    841c94ef717b5fd39ee1bfe6cd80700080174b598376a6a393d0d36cac777f13

  • SHA512

    05e881a2ca730d55e130e45d981e80cfc7378753d6fe3ade62f3e7b949d9dab45dfa4d06d19e83995e81b9aabec516984795165f60a3bfaaaa5b09b2023c4cb5

Malware Config

Extracted

Family

icedid

Campaign

1117948791

C2

reseptors.com

Targets

    • Target

      076da05987d7b49eaf6a5ba599117839.dll

    • Size

      559KB

    • MD5

      076da05987d7b49eaf6a5ba599117839

    • SHA1

      ca04036a3c15b57dd89421b265705f01aaa10c5a

    • SHA256

      841c94ef717b5fd39ee1bfe6cd80700080174b598376a6a393d0d36cac777f13

    • SHA512

      05e881a2ca730d55e130e45d981e80cfc7378753d6fe3ade62f3e7b949d9dab45dfa4d06d19e83995e81b9aabec516984795165f60a3bfaaaa5b09b2023c4cb5

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • suricata: ET MALWARE Win32/IcedID Request Cookie

      suricata: ET MALWARE Win32/IcedID Request Cookie

MITRE ATT&CK Matrix

Tasks