General

  • Target

    file

  • Size

    365KB

  • Sample

    220328-xx2z5sabbj

  • MD5

    33ec594aedfbfa5e2c8991ff791f0ed5

  • SHA1

    3fdd2ae5fc89fe29f104453e3cdca1173afaa242

  • SHA256

    c4626b70cc49988deb0a6c913bd66b319c1db8b488ac0c5b434150fb8b5540ae

  • SHA512

    13f956952a3bb4089f6a468cc4b94a90cb8e7488eb69698bd421717c914999fe347725ae72708792d2876e2ecca6ee30b5fe983a47ce564548894490f4fe66cf

Malware Config

Extracted

Family

icedid

Botnet

273095221

C2

qwesteresiler.top

hoseonlin.top

fallhuma.top

nefitsonyo.xyz

Attributes
  • auth_var

    3

  • url_path

    /news/

Targets

    • Target

      core.bat

    • Size

      190B

    • MD5

      90d45afa6d19dcdb77acbf7feb7e6acd

    • SHA1

      1d2082578ee2754f8a1832b43d34d2981e45349c

    • SHA256

      94ff05e826b154bce6b9dd22edf2d01d41fb61457a9e78943d4dba9e3e07f272

    • SHA512

      89c639562c183d1375a810378939fda3c8a08567c5a6e13eefd80ce711c8ed29e887af0dff1b845d6b44003055728048d819104f93bce3442b15cd3512905c5d

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Blocklisted process makes network request

    • Target

      impulse_x64.tmp

    • Size

      47KB

    • MD5

      44339859f207cef9ec6e6a376e505130

    • SHA1

      2af068457e66c9e821042c9ec064230fea3d649c

    • SHA256

      87bb5386fa3a670dad4c2c3dabb7021bf089fc1874c33b99168c10fc86f17bfb

    • SHA512

      79850b66c191b46503fdf622772fddb30a317b589243f793c09b32a4e80de65ca4d7fc92d6cf88ac9db15f6f6b6373d3c73fcb3a19b0225cb4d05c0e7592854b

    Score
    1/10

MITRE ATT&CK Matrix

Tasks