General

  • Target

    a5946318483cc9765cdfbf905c2f51d624776ff0bb0fcf17d51ec3722c111db7

  • Size

    149KB

  • Sample

    220307-mtvfsagcfn

  • MD5

    cdb6222d629d727740bb9eae252df37d

  • SHA1

    691de2ca7831b6daba56a86d16682039bc9c1cf0

  • SHA256

    a5946318483cc9765cdfbf905c2f51d624776ff0bb0fcf17d51ec3722c111db7

  • SHA512

    1326a3f9c05c2db8633695b4ba65673b212db68dd61596168ce82f2e90f75d47d563b3786e707e6e99a4af3745604b07e3310b747cc933de0fb27d2425fe4174

Malware Config

Extracted

Family

icedid

C2

rotmistr.club

5kilozhuto.top

Targets

    • Target

      a5946318483cc9765cdfbf905c2f51d624776ff0bb0fcf17d51ec3722c111db7

    • Size

      149KB

    • MD5

      cdb6222d629d727740bb9eae252df37d

    • SHA1

      691de2ca7831b6daba56a86d16682039bc9c1cf0

    • SHA256

      a5946318483cc9765cdfbf905c2f51d624776ff0bb0fcf17d51ec3722c111db7

    • SHA512

      1326a3f9c05c2db8633695b4ba65673b212db68dd61596168ce82f2e90f75d47d563b3786e707e6e99a4af3745604b07e3310b747cc933de0fb27d2425fe4174

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID Second Stage Loader

MITRE ATT&CK Matrix

Tasks