General

  • Target

    eb58a35e3b3ca4fcd7d075bb5d103548e90b16cb2211a3f81a5a7086932574d8

  • Size

    220KB

  • Sample

    220414-rve5psfhb5

  • MD5

    b338366a45738ac9256ea046a67ec1d1

  • SHA1

    a100f87c0818f9a2b9f1ad4e1e2d424b029f6a8a

  • SHA256

    eb58a35e3b3ca4fcd7d075bb5d103548e90b16cb2211a3f81a5a7086932574d8

  • SHA512

    325e0e5297384e09e0c7d0d921383af6824dbf31cf2de47d6cb898d5355e2406c07bd7965d76f01b9a9e126cb2730419d31038201305d3aab5f790665c9cee10

Malware Config

Extracted

Family

icedid

C2

firstcovo.pw

kilohardtostop.pw

dalobecu.xyz

googmusi.cyou

Targets

    • Target

      eb58a35e3b3ca4fcd7d075bb5d103548e90b16cb2211a3f81a5a7086932574d8

    • Size

      220KB

    • MD5

      b338366a45738ac9256ea046a67ec1d1

    • SHA1

      a100f87c0818f9a2b9f1ad4e1e2d424b029f6a8a

    • SHA256

      eb58a35e3b3ca4fcd7d075bb5d103548e90b16cb2211a3f81a5a7086932574d8

    • SHA512

      325e0e5297384e09e0c7d0d921383af6824dbf31cf2de47d6cb898d5355e2406c07bd7965d76f01b9a9e126cb2730419d31038201305d3aab5f790665c9cee10

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID Second Stage Loader

MITRE ATT&CK Matrix

Tasks