General

  • Target

    034b320baf14ce7c3c2d1b891ece94e5e51d5d4c1ec1ac672e7ae50c419df03a

  • Size

    185KB

  • Sample

    220420-lpqrcscaek

  • MD5

    e58ddf98177c97259920dce7c84a32cc

  • SHA1

    a805db2a378e6f43456f7f1a5818aade13446a2c

  • SHA256

    034b320baf14ce7c3c2d1b891ece94e5e51d5d4c1ec1ac672e7ae50c419df03a

  • SHA512

    9da3259c64fe875af06d3367194b9158d13e54ab4df027cda8c0ad9606a72629d7677acb711c69567e61f4bb0be20219082d6e172d4e1e01895db10629e23f17

Malware Config

Extracted

Family

icedid

C2

june85.cyou

golddisco.top

Targets

    • Target

      034b320baf14ce7c3c2d1b891ece94e5e51d5d4c1ec1ac672e7ae50c419df03a

    • Size

      185KB

    • MD5

      e58ddf98177c97259920dce7c84a32cc

    • SHA1

      a805db2a378e6f43456f7f1a5818aade13446a2c

    • SHA256

      034b320baf14ce7c3c2d1b891ece94e5e51d5d4c1ec1ac672e7ae50c419df03a

    • SHA512

      9da3259c64fe875af06d3367194b9158d13e54ab4df027cda8c0ad9606a72629d7677acb711c69567e61f4bb0be20219082d6e172d4e1e01895db10629e23f17

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID Second Stage Loader

MITRE ATT&CK Matrix

Tasks