General

  • Target

    6df941728dc938a2ca865cec0ca084b4d6c8c883ceda9aee7c5ae8999562952f

  • Size

    146KB

  • Sample

    220417-hwhgsaaagl

  • MD5

    efc7b2017949324023e128573bffce63

  • SHA1

    2ede155b13f7047eaa833a3f19407b5aa42be213

  • SHA256

    6df941728dc938a2ca865cec0ca084b4d6c8c883ceda9aee7c5ae8999562952f

  • SHA512

    a44b81c9396e54c19994129244714926cd18c53879b7afdeafa2ab3a25c582118909fa1f0c30e0569295c48b7534b18673beaf7fccacb9435e7a6f9e25e709bd

Malware Config

Extracted

Family

icedid

C2

likoncar.cyou

skrepamulan.cyou

Targets

    • Target

      6df941728dc938a2ca865cec0ca084b4d6c8c883ceda9aee7c5ae8999562952f

    • Size

      146KB

    • MD5

      efc7b2017949324023e128573bffce63

    • SHA1

      2ede155b13f7047eaa833a3f19407b5aa42be213

    • SHA256

      6df941728dc938a2ca865cec0ca084b4d6c8c883ceda9aee7c5ae8999562952f

    • SHA512

      a44b81c9396e54c19994129244714926cd18c53879b7afdeafa2ab3a25c582118909fa1f0c30e0569295c48b7534b18673beaf7fccacb9435e7a6f9e25e709bd

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID Second Stage Loader

MITRE ATT&CK Matrix

Tasks