General

  • Target

    4753c3ea77bac5552adea41fa924e5e8eb8418362a1513e2262ac5d5dd187c6b

  • Size

    178KB

  • Sample

    220508-2py1qshga7

  • MD5

    e9333552aa6f3277e651a75e0f902021

  • SHA1

    3eb73ed321842fe294899f2d2e77a5a829c93d90

  • SHA256

    4753c3ea77bac5552adea41fa924e5e8eb8418362a1513e2262ac5d5dd187c6b

  • SHA512

    f674bddd86937c7e635a56bd1fcb9cfeb8ee76dadc7a5ce141a7111830bfa2b8dacbce87000169e06aa270881f8bbd26019fd1b0bedb01a27fe4588b52e92227

Malware Config

Extracted

Family

icedid

C2

spehanemzu.top

Targets

    • Target

      4753c3ea77bac5552adea41fa924e5e8eb8418362a1513e2262ac5d5dd187c6b

    • Size

      178KB

    • MD5

      e9333552aa6f3277e651a75e0f902021

    • SHA1

      3eb73ed321842fe294899f2d2e77a5a829c93d90

    • SHA256

      4753c3ea77bac5552adea41fa924e5e8eb8418362a1513e2262ac5d5dd187c6b

    • SHA512

      f674bddd86937c7e635a56bd1fcb9cfeb8ee76dadc7a5ce141a7111830bfa2b8dacbce87000169e06aa270881f8bbd26019fd1b0bedb01a27fe4588b52e92227

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

    • Blocklisted process makes network request

MITRE ATT&CK Matrix

Tasks