General

  • Target

    c49f89af3ceb178d29ce17a38888f78b324065f552b0db1195be0623ce227db4

  • Size

    166KB

  • Sample

    220502-s3kktsahbn

  • MD5

    345cde136a86c6b5551768e226951351

  • SHA1

    8636422b8690a01dab8b2557b1e40a1b259c56f6

  • SHA256

    c49f89af3ceb178d29ce17a38888f78b324065f552b0db1195be0623ce227db4

  • SHA512

    d6c994cfc93be6bfafa9c239a21e428072766c8393e0653f8f64a6b67eaa4aae2515aff6b5d6c72b56ea3559774b63ffc1626df65860aaf1f207995ba36f617d

Malware Config

Extracted

Family

icedid

C2

spaceprogramm.cloud

Targets

    • Target

      c49f89af3ceb178d29ce17a38888f78b324065f552b0db1195be0623ce227db4

    • Size

      166KB

    • MD5

      345cde136a86c6b5551768e226951351

    • SHA1

      8636422b8690a01dab8b2557b1e40a1b259c56f6

    • SHA256

      c49f89af3ceb178d29ce17a38888f78b324065f552b0db1195be0623ce227db4

    • SHA512

      d6c994cfc93be6bfafa9c239a21e428072766c8393e0653f8f64a6b67eaa4aae2515aff6b5d6c72b56ea3559774b63ffc1626df65860aaf1f207995ba36f617d

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

    • Blocklisted process makes network request

MITRE ATT&CK Matrix

Tasks