General

  • Target

    d6fd90e0c6cd46efd56accddd57ec0d9.dll

  • Size

    579KB

  • Sample

    220220-t9y78sbeg4

  • MD5

    d6fd90e0c6cd46efd56accddd57ec0d9

  • SHA1

    58bf0c2c71c0abdde62f29adcd08f358d94e6348

  • SHA256

    358679a5aa1ce479cc20c624d3fefe26170b3ad052ed9aa8111bf3047c755ee2

  • SHA512

    e18769feae6cf62d3ddc532c61b43b4977644ac14dc098e0f403d59169c9eff9823bf7bfb617cfd50b96a4655d2db328b935696b3efb84da8bcbcfd2ada9125b

Malware Config

Extracted

Family

icedid

Campaign

1117948791

C2

reseptors.com

Targets

    • Target

      d6fd90e0c6cd46efd56accddd57ec0d9.dll

    • Size

      579KB

    • MD5

      d6fd90e0c6cd46efd56accddd57ec0d9

    • SHA1

      58bf0c2c71c0abdde62f29adcd08f358d94e6348

    • SHA256

      358679a5aa1ce479cc20c624d3fefe26170b3ad052ed9aa8111bf3047c755ee2

    • SHA512

      e18769feae6cf62d3ddc532c61b43b4977644ac14dc098e0f403d59169c9eff9823bf7bfb617cfd50b96a4655d2db328b935696b3efb84da8bcbcfd2ada9125b

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

MITRE ATT&CK Enterprise v6

Tasks