General

  • Target

    729a43fa76a2b217374ba97a0615e3af64e68e1840d2c06702bd429d75fb738e

  • Size

    258KB

  • Sample

    220502-npzqdaaaf9

  • MD5

    e90dabf0d141d8e29dd00dc0908b5891

  • SHA1

    e66fc76ada8050dcd5d6ba5f9020a0945e698886

  • SHA256

    729a43fa76a2b217374ba97a0615e3af64e68e1840d2c06702bd429d75fb738e

  • SHA512

    80ad20e2dc3c406ad0b672440f504ba0bccd9c67fed20b1a6079a742e70135801d8b7e2efc25401f6a476c4618cdb49d69b0dd943da3a8935e92fdde2ffd203b

Malware Config

Extracted

Family

icedid

C2

minishtab.cyou

xoxofuck.cyou

Targets

    • Target

      729a43fa76a2b217374ba97a0615e3af64e68e1840d2c06702bd429d75fb738e

    • Size

      258KB

    • MD5

      e90dabf0d141d8e29dd00dc0908b5891

    • SHA1

      e66fc76ada8050dcd5d6ba5f9020a0945e698886

    • SHA256

      729a43fa76a2b217374ba97a0615e3af64e68e1840d2c06702bd429d75fb738e

    • SHA512

      80ad20e2dc3c406ad0b672440f504ba0bccd9c67fed20b1a6079a742e70135801d8b7e2efc25401f6a476c4618cdb49d69b0dd943da3a8935e92fdde2ffd203b

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID Second Stage Loader

MITRE ATT&CK Matrix

Tasks