General

  • Target

    34216fd20582d86021dc492deecd457890a6f7d1c694557708ab7e041671450a

  • Size

    146KB

  • Sample

    220502-s3l4nagdf3

  • MD5

    019e954706a40e8fdb42c7fcd9402e47

  • SHA1

    865eb6b9189998cc66e883bdb3008d09c71d931e

  • SHA256

    34216fd20582d86021dc492deecd457890a6f7d1c694557708ab7e041671450a

  • SHA512

    c1e2a6cdb2fd41204cee4dc5b3ecc9e37b9c7d9562c8aa784d4d36f96f62506a3cad42bc7231a6e7b2cf30ba768b5f5adebab2bc386fc3db3db855b10174522c

Malware Config

Extracted

Family

icedid

C2

likoncar.cyou

skrepamulan.cyou

Targets

    • Target

      34216fd20582d86021dc492deecd457890a6f7d1c694557708ab7e041671450a

    • Size

      146KB

    • MD5

      019e954706a40e8fdb42c7fcd9402e47

    • SHA1

      865eb6b9189998cc66e883bdb3008d09c71d931e

    • SHA256

      34216fd20582d86021dc492deecd457890a6f7d1c694557708ab7e041671450a

    • SHA512

      c1e2a6cdb2fd41204cee4dc5b3ecc9e37b9c7d9562c8aa784d4d36f96f62506a3cad42bc7231a6e7b2cf30ba768b5f5adebab2bc386fc3db3db855b10174522c

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID Second Stage Loader

MITRE ATT&CK Matrix

Tasks