General

  • Target

    095cc3f8cd585ab09c1de61229149e469fe09630c0aca84abc54ba7ddeff77fb

  • Size

    341KB

  • Sample

    220327-cqa8magdfp

  • MD5

    84415c4b8574f0b9327c10dbdafe9988

  • SHA1

    4340d44df7828ec83030fc6e340eae59678f127a

  • SHA256

    095cc3f8cd585ab09c1de61229149e469fe09630c0aca84abc54ba7ddeff77fb

  • SHA512

    ee7f71af2b9073904776afd92ba83aeb8731a01e31ad826c954e595591a052597df37f65f52f95ccd02d90f2d7c50db8b23ca23287aa24fd109c773c3738cbb9

Malware Config

Extracted

Family

icedid

C2

aborigencredit.xyz

ideology8cum.top

Targets

    • Target

      095cc3f8cd585ab09c1de61229149e469fe09630c0aca84abc54ba7ddeff77fb

    • Size

      341KB

    • MD5

      84415c4b8574f0b9327c10dbdafe9988

    • SHA1

      4340d44df7828ec83030fc6e340eae59678f127a

    • SHA256

      095cc3f8cd585ab09c1de61229149e469fe09630c0aca84abc54ba7ddeff77fb

    • SHA512

      ee7f71af2b9073904776afd92ba83aeb8731a01e31ad826c954e595591a052597df37f65f52f95ccd02d90f2d7c50db8b23ca23287aa24fd109c773c3738cbb9

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID Second Stage Loader

MITRE ATT&CK Matrix

Tasks