General

  • Target

    e70c965ae03c89538c94cc65ada5194c0b129a67e4c5f0eca728965ff4f831ae

  • Size

    2.1MB

  • Sample

    220411-qdr79sfcej

  • MD5

    ffb7508a9fa7ea9c3adbaa1ee14e1cab

  • SHA1

    4c717031f4d273a5505add19ba948740ae529450

  • SHA256

    e70c965ae03c89538c94cc65ada5194c0b129a67e4c5f0eca728965ff4f831ae

  • SHA512

    96b6dff6102ab36c2f19b4d7d18aff64c03c59814ee7fd9166d98a3255c108cedfb3b29788929f5b90b6083d61f535c1009874d66bf3eb64672a2e1a5bb47b62

Malware Config

Extracted

Family

icedid

Campaign

816407799

C2

ertimadifa.com

Targets

    • Target

      e70c965ae03c89538c94cc65ada5194c0b129a67e4c5f0eca728965ff4f831ae

    • Size

      2.1MB

    • MD5

      ffb7508a9fa7ea9c3adbaa1ee14e1cab

    • SHA1

      4c717031f4d273a5505add19ba948740ae529450

    • SHA256

      e70c965ae03c89538c94cc65ada5194c0b129a67e4c5f0eca728965ff4f831ae

    • SHA512

      96b6dff6102ab36c2f19b4d7d18aff64c03c59814ee7fd9166d98a3255c108cedfb3b29788929f5b90b6083d61f535c1009874d66bf3eb64672a2e1a5bb47b62

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • suricata: ET MALWARE Win32/IcedID Request Cookie

      suricata: ET MALWARE Win32/IcedID Request Cookie

    • IcedID First Stage Loader

MITRE ATT&CK Matrix

Tasks