General

  • Target

    a42d72de0a6f75d35da5424bbaf5ccf1ccc3990793e48f599af41110e5545e0f

  • Size

    148KB

  • Sample

    220319-ycy87ahba5

  • MD5

    b1139c748cf0c458f33ada857fd3ab10

  • SHA1

    1a860f7f6309e7c6b43a88650795096f92200bc6

  • SHA256

    a42d72de0a6f75d35da5424bbaf5ccf1ccc3990793e48f599af41110e5545e0f

  • SHA512

    0ebac8904ebb56a91a3c9e7e7b9e00efc79604b90b83f9072dd0c874fe67c7258441ba23fcba27e703034e2c02a69787a15fa1405b191f5248b2e327096061c4

Malware Config

Extracted

Family

icedid

C2

zoperawekil8.top

Targets

    • Target

      a42d72de0a6f75d35da5424bbaf5ccf1ccc3990793e48f599af41110e5545e0f

    • Size

      148KB

    • MD5

      b1139c748cf0c458f33ada857fd3ab10

    • SHA1

      1a860f7f6309e7c6b43a88650795096f92200bc6

    • SHA256

      a42d72de0a6f75d35da5424bbaf5ccf1ccc3990793e48f599af41110e5545e0f

    • SHA512

      0ebac8904ebb56a91a3c9e7e7b9e00efc79604b90b83f9072dd0c874fe67c7258441ba23fcba27e703034e2c02a69787a15fa1405b191f5248b2e327096061c4

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

    • Blocklisted process makes network request

MITRE ATT&CK Matrix

Tasks