General

  • Target

    minro.bin

  • Size

    124KB

  • Sample

    220331-n4hqeabeb2

  • MD5

    46de3a8f04fcbed38a7d73bfc50f240a

  • SHA1

    24dff443e7051c0c15d79ca4d47c82dc38d20ad5

  • SHA256

    e4e4e02e3e2dec5358eab422c2bad873d816569f03df68f8372e3d25a2f05a22

  • SHA512

    7c65bd8afd6aa3c1f9619b67c655897858d0988558faa13e7c21f6f0140bf075ab86b720196abdcfd39db328eb332d407fc3418b0c8a9dbdddf37ac1f81e3b22

Malware Config

Extracted

Family

icedid

Campaign

1666752692

C2

ritionalvalueon.top

Targets

    • Target

      minro.bin

    • Size

      124KB

    • MD5

      46de3a8f04fcbed38a7d73bfc50f240a

    • SHA1

      24dff443e7051c0c15d79ca4d47c82dc38d20ad5

    • SHA256

      e4e4e02e3e2dec5358eab422c2bad873d816569f03df68f8372e3d25a2f05a22

    • SHA512

      7c65bd8afd6aa3c1f9619b67c655897858d0988558faa13e7c21f6f0140bf075ab86b720196abdcfd39db328eb332d407fc3418b0c8a9dbdddf37ac1f81e3b22

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

MITRE ATT&CK Matrix

Tasks