General

  • Target

    2a27d5511d7d3576e41543570cab5b2e10d3a915320d5224a5986d15b5e8ae00

  • Size

    88KB

  • Sample

    220419-dnjmnahbfr

  • MD5

    edcbac74f7f1e2b08ed9f8c35314a1c3

  • SHA1

    dc18ec9bdda1004aa3d1a1b15dba0542a3031656

  • SHA256

    2a27d5511d7d3576e41543570cab5b2e10d3a915320d5224a5986d15b5e8ae00

  • SHA512

    04600a9143018115e22b596650b71e9a03966725eaf256572b6c4bc963ba140abb0155d2054f1864b13d9d835a7bdd9256ca90cd05fcd2ec2321a30ec2e073cb

Malware Config

Extracted

Family

icedid

C2

ldrcreep.net

Targets

    • Target

      2a27d5511d7d3576e41543570cab5b2e10d3a915320d5224a5986d15b5e8ae00

    • Size

      88KB

    • MD5

      edcbac74f7f1e2b08ed9f8c35314a1c3

    • SHA1

      dc18ec9bdda1004aa3d1a1b15dba0542a3031656

    • SHA256

      2a27d5511d7d3576e41543570cab5b2e10d3a915320d5224a5986d15b5e8ae00

    • SHA512

      04600a9143018115e22b596650b71e9a03966725eaf256572b6c4bc963ba140abb0155d2054f1864b13d9d835a7bdd9256ca90cd05fcd2ec2321a30ec2e073cb

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

    • Blocklisted process makes network request

MITRE ATT&CK Matrix

Tasks