General

  • Target

    02a593571d2221f5eccdba5cbfaccba9f2a821fdc2b133895c0916b41f8cf575

  • Size

    347KB

  • Sample

    220427-wtvwzsgca2

  • MD5

    a2d191168117d47b6b198ca0cb41e3e2

  • SHA1

    81f69c70490f4aee50ac1e5121686a2632e568bd

  • SHA256

    02a593571d2221f5eccdba5cbfaccba9f2a821fdc2b133895c0916b41f8cf575

  • SHA512

    af02093a3d4f40eddfa8c4060443f4b7f24c781795c41ae459ecb6f488ff39a9fa841924bc5118ceeda6f3d882fd27474c3bd3230d3980eb8885fab0da8a3ec2

Malware Config

Extracted

Family

icedid

C2

argentinocapuccho.cyou

Targets

    • Target

      02a593571d2221f5eccdba5cbfaccba9f2a821fdc2b133895c0916b41f8cf575

    • Size

      347KB

    • MD5

      a2d191168117d47b6b198ca0cb41e3e2

    • SHA1

      81f69c70490f4aee50ac1e5121686a2632e568bd

    • SHA256

      02a593571d2221f5eccdba5cbfaccba9f2a821fdc2b133895c0916b41f8cf575

    • SHA512

      af02093a3d4f40eddfa8c4060443f4b7f24c781795c41ae459ecb6f488ff39a9fa841924bc5118ceeda6f3d882fd27474c3bd3230d3980eb8885fab0da8a3ec2

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

    • Blocklisted process makes network request

MITRE ATT&CK Matrix

Tasks