General

  • Target

    6895f8f4079aedb560e79f4c93e512b9b831f258ebf4b01036b380da5e430d56

  • Size

    278KB

  • Sample

    220503-ank9psfgck

  • MD5

    84d626a889da1f956e458fa354853be5

  • SHA1

    5cd94693a3ee363455f00a6a3b0282601ffd7069

  • SHA256

    6895f8f4079aedb560e79f4c93e512b9b831f258ebf4b01036b380da5e430d56

  • SHA512

    07b87ca7c88c69ae1241c578fad4facfd67fd60b1409dc8d3daec1425830082925f17360a4855a75e5e6ec4f02f2698b58e98727ff4bdffd95546191708f84bb

Malware Config

Extracted

Family

icedid

C2

kravynolu.cyou

nikushotomo.cyou

Targets

    • Target

      6895f8f4079aedb560e79f4c93e512b9b831f258ebf4b01036b380da5e430d56

    • Size

      278KB

    • MD5

      84d626a889da1f956e458fa354853be5

    • SHA1

      5cd94693a3ee363455f00a6a3b0282601ffd7069

    • SHA256

      6895f8f4079aedb560e79f4c93e512b9b831f258ebf4b01036b380da5e430d56

    • SHA512

      07b87ca7c88c69ae1241c578fad4facfd67fd60b1409dc8d3daec1425830082925f17360a4855a75e5e6ec4f02f2698b58e98727ff4bdffd95546191708f84bb

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID Second Stage Loader

MITRE ATT&CK Matrix

Tasks