General

  • Target

    FwlRpmIPXx.exe

  • Size

    242KB

  • Sample

    220325-vakfgafbbk

  • MD5

    febd4b99b0131d10d95e71e9ec1d2476

  • SHA1

    8d161b857215a037dcde09c9227d2784984f9fd8

  • SHA256

    16641647772f6572cdf8554198279560e98ce8e686f4433ca64e2031b8ffabdc

  • SHA512

    e112810667cbff52f5d82a17f7bf6274585511d020d050c9e457dc10308e651f8afad069765ae6f7d971ad771da20ee90162c5ed54490c2b255f7d324d049c13

Malware Config

Extracted

Family

icedid

Campaign

0

Extracted

Family

icedid

Campaign

3714063495

C2

ritionalvalueon.top

Targets

    • Target

      FwlRpmIPXx.exe

    • Size

      242KB

    • MD5

      febd4b99b0131d10d95e71e9ec1d2476

    • SHA1

      8d161b857215a037dcde09c9227d2784984f9fd8

    • SHA256

      16641647772f6572cdf8554198279560e98ce8e686f4433ca64e2031b8ffabdc

    • SHA512

      e112810667cbff52f5d82a17f7bf6274585511d020d050c9e457dc10308e651f8afad069765ae6f7d971ad771da20ee90162c5ed54490c2b255f7d324d049c13

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks