General

  • Target

    ef59acbe03880ac8941ad3f36cd8d2cf0c5d86c9c19edf0bd45c0ec289a8ca83

  • Size

    234KB

  • Sample

    220508-t6kwfaceb3

  • MD5

    4bed6fac80dd4de89d8208858a5d74b4

  • SHA1

    dc81338df166bc7573251bbfa0f05a7d035627c3

  • SHA256

    ef59acbe03880ac8941ad3f36cd8d2cf0c5d86c9c19edf0bd45c0ec289a8ca83

  • SHA512

    db615539189dddba6b14c53bd7d17bbece81ce942451491559d3cb284ae0094f4edd1028df80f34073a26e8f92c20931b4c97c77fcd826d511216fd1b5d29ca1

Malware Config

Extracted

Family

icedid

Extracted

Family

icedid

Botnet

2634746917

C2

june85.cyou

golddisco.top

Attributes
  • auth_var

    1

  • url_path

    /audio/

Targets

    • Target

      ef59acbe03880ac8941ad3f36cd8d2cf0c5d86c9c19edf0bd45c0ec289a8ca83

    • Size

      234KB

    • MD5

      4bed6fac80dd4de89d8208858a5d74b4

    • SHA1

      dc81338df166bc7573251bbfa0f05a7d035627c3

    • SHA256

      ef59acbe03880ac8941ad3f36cd8d2cf0c5d86c9c19edf0bd45c0ec289a8ca83

    • SHA512

      db615539189dddba6b14c53bd7d17bbece81ce942451491559d3cb284ae0094f4edd1028df80f34073a26e8f92c20931b4c97c77fcd826d511216fd1b5d29ca1

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID Second Stage Loader

MITRE ATT&CK Matrix

Tasks