General

  • Target

    4f39a6eb76ad32e6265638b299df3f001292f14208d4b7dadc583577bfdd73ce

  • Size

    278KB

  • Sample

    220417-k3ck8agca7

  • MD5

    f256b883245baeb7fe91cfa0563a0d57

  • SHA1

    e0b7d74982a2657303241d0b5497cc82bb6c1b77

  • SHA256

    4f39a6eb76ad32e6265638b299df3f001292f14208d4b7dadc583577bfdd73ce

  • SHA512

    bad2b3304cfa0be810abbb4d0e82da377e50a8f7f58d3ec997a9d2b6b703400e9d03fff3d78eabbbbe3118b2f9f6f931f8db8651bfd2ca4feb39ed21cc69bb78

Malware Config

Extracted

Family

icedid

C2

supportayzer.shop

bookoffathes.pw

Targets

    • Target

      4f39a6eb76ad32e6265638b299df3f001292f14208d4b7dadc583577bfdd73ce

    • Size

      278KB

    • MD5

      f256b883245baeb7fe91cfa0563a0d57

    • SHA1

      e0b7d74982a2657303241d0b5497cc82bb6c1b77

    • SHA256

      4f39a6eb76ad32e6265638b299df3f001292f14208d4b7dadc583577bfdd73ce

    • SHA512

      bad2b3304cfa0be810abbb4d0e82da377e50a8f7f58d3ec997a9d2b6b703400e9d03fff3d78eabbbbe3118b2f9f6f931f8db8651bfd2ca4feb39ed21cc69bb78

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID Second Stage Loader

MITRE ATT&CK Matrix

Tasks