General

  • Target

    BFB4B9B655E9DB3CC719581DEB44193F.dll

  • Size

    148KB

  • Sample

    220322-zcckvsedep

  • MD5

    bfb4b9b655e9db3cc719581deb44193f

  • SHA1

    39f71512c9ff6571a4b59616b27b521f861ff9c8

  • SHA256

    761a643ab6c21137540dac5382c855c329c991581b3ab8b637dd541e09b6824d

  • SHA512

    295a5b27882a3cdc73b9426c45e5b7d51c4b0c52142551f203dff75d271c989f1577cd6d1191e8d533a737350fb15130b802e0340e46d008f82e89531eb671d9

Malware Config

Extracted

Family

icedid

Campaign

3529509686

C2

oceriesfornot.top

Targets

    • Target

      BFB4B9B655E9DB3CC719581DEB44193F.dll

    • Size

      148KB

    • MD5

      bfb4b9b655e9db3cc719581deb44193f

    • SHA1

      39f71512c9ff6571a4b59616b27b521f861ff9c8

    • SHA256

      761a643ab6c21137540dac5382c855c329c991581b3ab8b637dd541e09b6824d

    • SHA512

      295a5b27882a3cdc73b9426c45e5b7d51c4b0c52142551f203dff75d271c989f1577cd6d1191e8d533a737350fb15130b802e0340e46d008f82e89531eb671d9

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • suricata: ET MALWARE Win32/IcedID Request Cookie

      suricata: ET MALWARE Win32/IcedID Request Cookie

MITRE ATT&CK Matrix

Tasks