General

  • Target

    d7d2a8dec73b067160740aa1c436bb80695d48d1b2b93a85c9a2d44840b4fc02

  • Size

    292KB

  • Sample

    220418-qst1eadae6

  • MD5

    28f6df374af2a1bab7dd5dc600995392

  • SHA1

    a85a7cce87b64d9c1d6a735dc1ce2d444f18e93a

  • SHA256

    d7d2a8dec73b067160740aa1c436bb80695d48d1b2b93a85c9a2d44840b4fc02

  • SHA512

    f1557a7333a9d1568717bbe31f60c9f7fabb8d7ff720355ea48bf46e14a1c4dace8262f0d2c4e85700218ac0ae2e5c5420c02a13c0715325c7d0d44173604811

Malware Config

Extracted

Family

icedid

C2

pashamasha.top

pohindra.online

Targets

    • Target

      d7d2a8dec73b067160740aa1c436bb80695d48d1b2b93a85c9a2d44840b4fc02

    • Size

      292KB

    • MD5

      28f6df374af2a1bab7dd5dc600995392

    • SHA1

      a85a7cce87b64d9c1d6a735dc1ce2d444f18e93a

    • SHA256

      d7d2a8dec73b067160740aa1c436bb80695d48d1b2b93a85c9a2d44840b4fc02

    • SHA512

      f1557a7333a9d1568717bbe31f60c9f7fabb8d7ff720355ea48bf46e14a1c4dace8262f0d2c4e85700218ac0ae2e5c5420c02a13c0715325c7d0d44173604811

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID Second Stage Loader

MITRE ATT&CK Matrix

Tasks