General

  • Target

    4fd7ce0338386d2af9c3b7878adc006165be1a5681fbacfe68137b2fe0a3722d

  • Size

    104KB

  • Sample

    220502-np1bxaegfm

  • MD5

    5e78ec29e0b3031de4c98364efa10276

  • SHA1

    322494b0b7569336f8c51b021cc3bbc9ce50783e

  • SHA256

    4fd7ce0338386d2af9c3b7878adc006165be1a5681fbacfe68137b2fe0a3722d

  • SHA512

    8a5d76a4d9d200c730bacedde5ce30f64f918427908c80c85ad6c6c43b596d286d80232bbe658f6746c0c5622e0396327abdd8101bd0e324a22c01f43020990d

Malware Config

Extracted

Family

icedid

C2

linvorodana.cyou

kremlinvorona.pw

Targets

    • Target

      4fd7ce0338386d2af9c3b7878adc006165be1a5681fbacfe68137b2fe0a3722d

    • Size

      104KB

    • MD5

      5e78ec29e0b3031de4c98364efa10276

    • SHA1

      322494b0b7569336f8c51b021cc3bbc9ce50783e

    • SHA256

      4fd7ce0338386d2af9c3b7878adc006165be1a5681fbacfe68137b2fe0a3722d

    • SHA512

      8a5d76a4d9d200c730bacedde5ce30f64f918427908c80c85ad6c6c43b596d286d80232bbe658f6746c0c5622e0396327abdd8101bd0e324a22c01f43020990d

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID Second Stage Loader

MITRE ATT&CK Matrix

Tasks