General

  • Target

    57ea53af93562bd35e882e98a0f40481e816a54871ed3f4bb16a981371efb0ce

  • Size

    490KB

  • Sample

    220221-lss1wsahfl

  • MD5

    cfd0da2d0d69f9df1d7fe409953832f5

  • SHA1

    72f2f86fa83a51c30e733a147149c0fda2d71701

  • SHA256

    57ea53af93562bd35e882e98a0f40481e816a54871ed3f4bb16a981371efb0ce

  • SHA512

    42d8427ee3cd87fb7947519b7be9e28bcf8668ed9a713c50e6ebf44bdef877af1a53319cdee2f3ec12c375911b368b3c95487cd8daffb5d5e93dc98335f9aa70

Malware Config

Extracted

Family

icedid

Campaign

3467965077

C2

firenicatrible.com

Targets

    • Target

      57ea53af93562bd35e882e98a0f40481e816a54871ed3f4bb16a981371efb0ce

    • Size

      490KB

    • MD5

      cfd0da2d0d69f9df1d7fe409953832f5

    • SHA1

      72f2f86fa83a51c30e733a147149c0fda2d71701

    • SHA256

      57ea53af93562bd35e882e98a0f40481e816a54871ed3f4bb16a981371efb0ce

    • SHA512

      42d8427ee3cd87fb7947519b7be9e28bcf8668ed9a713c50e6ebf44bdef877af1a53319cdee2f3ec12c375911b368b3c95487cd8daffb5d5e93dc98335f9aa70

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • suricata: ET MALWARE Win32/IcedID Request Cookie

      suricata: ET MALWARE Win32/IcedID Request Cookie

MITRE ATT&CK Matrix

Tasks