General

  • Target

    196cf1efaced8aaa904f9556cb8ae8b1.dll

  • Size

    606KB

  • Sample

    220219-wsla6acfbq

  • MD5

    196cf1efaced8aaa904f9556cb8ae8b1

  • SHA1

    1d6eb0e95c04d54b39b809abd28da05b44b14f1b

  • SHA256

    66a90194dd80475dc2c18ce5884bc94979747aa8cd5f24a4b971d8efaaf59426

  • SHA512

    ecad28c6afef1e479f264cec26407f829f2ef03df3e1663133d42cee1eb94fecef8ba91a7b8cc5e9902102746159eb70d7eb476757ace6dd0cba146fbb63ad31

Malware Config

Extracted

Family

icedid

Campaign

1117948791

C2

reseptors.com

Targets

    • Target

      196cf1efaced8aaa904f9556cb8ae8b1.dll

    • Size

      606KB

    • MD5

      196cf1efaced8aaa904f9556cb8ae8b1

    • SHA1

      1d6eb0e95c04d54b39b809abd28da05b44b14f1b

    • SHA256

      66a90194dd80475dc2c18ce5884bc94979747aa8cd5f24a4b971d8efaaf59426

    • SHA512

      ecad28c6afef1e479f264cec26407f829f2ef03df3e1663133d42cee1eb94fecef8ba91a7b8cc5e9902102746159eb70d7eb476757ace6dd0cba146fbb63ad31

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • suricata: ET MALWARE Win32/IcedID Request Cookie

      suricata: ET MALWARE Win32/IcedID Request Cookie

MITRE ATT&CK Enterprise v6

Tasks