General

  • Target

    5fc988c40235b772e5909d360780c9365821984bf35d6dc178ee0ad72bc27f8d

  • Size

    288KB

  • Sample

    220507-y57q2adef6

  • MD5

    5f9b863755e1a3bc7a439ff8da19ac33

  • SHA1

    fe847e079b94543ef63a96701e6e566ed8751c6b

  • SHA256

    5fc988c40235b772e5909d360780c9365821984bf35d6dc178ee0ad72bc27f8d

  • SHA512

    73d4f415dd66a7cb7350048210971976c0d0e224d1c8688afaa9ef9592ba6f41f31d19aafc31b788b9a3c58b4f7be222047d60a77d1d6960dff81b63d8c0e2c4

Malware Config

Extracted

Family

icedid

C2

loadbmw.click

Targets

    • Target

      5fc988c40235b772e5909d360780c9365821984bf35d6dc178ee0ad72bc27f8d

    • Size

      288KB

    • MD5

      5f9b863755e1a3bc7a439ff8da19ac33

    • SHA1

      fe847e079b94543ef63a96701e6e566ed8751c6b

    • SHA256

      5fc988c40235b772e5909d360780c9365821984bf35d6dc178ee0ad72bc27f8d

    • SHA512

      73d4f415dd66a7cb7350048210971976c0d0e224d1c8688afaa9ef9592ba6f41f31d19aafc31b788b9a3c58b4f7be222047d60a77d1d6960dff81b63d8c0e2c4

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

    • Blocklisted process makes network request

MITRE ATT&CK Matrix

Tasks