General

  • Target

    dart.dll

  • Size

    149KB

  • Sample

    220321-1djw1aabdm

  • MD5

    5a10673301a00d36c56e189d0ff3b6a5

  • SHA1

    c90c05bc0413134e026038b9f55e3119de15e215

  • SHA256

    0ecca89b428fe89c9af8a661a71c8e5eab9873d76ff5b4191fbd94100d0e05bc

  • SHA512

    aa56193f93bd43e78a2af187c4458e92fc05c953d1e2e39a5576b577d1ae3fd1c4993c39b95956162f2f05badda61a9ed06c92abb0a6c3c214e1bcb97c03c23e

Malware Config

Extracted

Family

icedid

Campaign

3546287305

C2

oceriesfornot.top

Targets

    • Target

      dart.dll

    • Size

      149KB

    • MD5

      5a10673301a00d36c56e189d0ff3b6a5

    • SHA1

      c90c05bc0413134e026038b9f55e3119de15e215

    • SHA256

      0ecca89b428fe89c9af8a661a71c8e5eab9873d76ff5b4191fbd94100d0e05bc

    • SHA512

      aa56193f93bd43e78a2af187c4458e92fc05c953d1e2e39a5576b577d1ae3fd1c4993c39b95956162f2f05badda61a9ed06c92abb0a6c3c214e1bcb97c03c23e

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • suricata: ET MALWARE Win32/IcedID Request Cookie

      suricata: ET MALWARE Win32/IcedID Request Cookie

    • Drops file in System32 directory

MITRE ATT&CK Matrix

Tasks