General

  • Target

    data.dll

  • Size

    382KB

  • Sample

    220222-31shrsfdg2

  • MD5

    663c91a724d41e1f2b5c0c007da66cd6

  • SHA1

    f9428daeebd760bf31a2b0e3ef805a98abc942d4

  • SHA256

    688190ebc2254ad085eff4fadf1e086d7b2b0a0b38e32730a85a798b3d56dd07

  • SHA512

    1dff5b313feca82b6ca1e5fcfb7937e5366c31b9d870181db47fe4e63661f5e6e5fe74a6ab0dcdfcab4f33912ee3b8c70e2f2cb4c7962465acf6b20924900f55

Malware Config

Extracted

Family

icedid

Campaign

936086471

C2

reseptors.com

Targets

    • Target

      data.dll

    • Size

      382KB

    • MD5

      663c91a724d41e1f2b5c0c007da66cd6

    • SHA1

      f9428daeebd760bf31a2b0e3ef805a98abc942d4

    • SHA256

      688190ebc2254ad085eff4fadf1e086d7b2b0a0b38e32730a85a798b3d56dd07

    • SHA512

      1dff5b313feca82b6ca1e5fcfb7937e5366c31b9d870181db47fe4e63661f5e6e5fe74a6ab0dcdfcab4f33912ee3b8c70e2f2cb4c7962465acf6b20924900f55

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

MITRE ATT&CK Matrix

Tasks