General

  • Target

    f8f351415ee7c63613aede4a8b4642c2afa432396ef5f949a1b8e6a58210f41e

  • Size

    238KB

  • Sample

    220508-bfbkzaahf3

  • MD5

    62ed03b882afc7078cc3bd6563f4a608

  • SHA1

    eac946a5a75735f110ac66aede384676b2094ae6

  • SHA256

    f8f351415ee7c63613aede4a8b4642c2afa432396ef5f949a1b8e6a58210f41e

  • SHA512

    a1d6b9138fa00dbf0aa0aaafe013d3f3203d40a2ac6eb4b98d3896af6cce9df640c373fb85296e718b1e5bf87fb36d4abc094416e8948b947081cd87c050937d

Malware Config

Extracted

Family

icedid

Extracted

Family

icedid

Botnet

2635507097

C2

rufepuksuka.cyou

uzhokpidarok.cyou

Attributes
  • auth_var

    1

  • url_path

    /audio/

Targets

    • Target

      f8f351415ee7c63613aede4a8b4642c2afa432396ef5f949a1b8e6a58210f41e

    • Size

      238KB

    • MD5

      62ed03b882afc7078cc3bd6563f4a608

    • SHA1

      eac946a5a75735f110ac66aede384676b2094ae6

    • SHA256

      f8f351415ee7c63613aede4a8b4642c2afa432396ef5f949a1b8e6a58210f41e

    • SHA512

      a1d6b9138fa00dbf0aa0aaafe013d3f3203d40a2ac6eb4b98d3896af6cce9df640c373fb85296e718b1e5bf87fb36d4abc094416e8948b947081cd87c050937d

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID Second Stage Loader

MITRE ATT&CK Matrix

Tasks