General

  • Target

    c9a0d2f664277db1c90ebb2bc9549ef36d0fcd97332a47144ddaee0c1a2e725f

  • Size

    460KB

  • Sample

    220315-t2gm8addg7

  • MD5

    afcdc096a7a22b16a2343bd1dd0fca4f

  • SHA1

    f4eac2b02fcee42298b8b0352e4fd146fe97c9f5

  • SHA256

    c9a0d2f664277db1c90ebb2bc9549ef36d0fcd97332a47144ddaee0c1a2e725f

  • SHA512

    5db4c9c33781a747e82dd568214cf906a50c44371c83a5f9a4c29edbc4f4379bc0e44c14f8a67dc8047c4ba915011889c1e50b51a7da6155cc31777531737183

Malware Config

Extracted

Family

icedid

C2

karimorodrigo.pw

airtopolos.best

Targets

    • Target

      c9a0d2f664277db1c90ebb2bc9549ef36d0fcd97332a47144ddaee0c1a2e725f

    • Size

      460KB

    • MD5

      afcdc096a7a22b16a2343bd1dd0fca4f

    • SHA1

      f4eac2b02fcee42298b8b0352e4fd146fe97c9f5

    • SHA256

      c9a0d2f664277db1c90ebb2bc9549ef36d0fcd97332a47144ddaee0c1a2e725f

    • SHA512

      5db4c9c33781a747e82dd568214cf906a50c44371c83a5f9a4c29edbc4f4379bc0e44c14f8a67dc8047c4ba915011889c1e50b51a7da6155cc31777531737183

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID Second Stage Loader

MITRE ATT&CK Matrix

Tasks