General

  • Target

    2443e2650a14ab28210e18bdb906646279a03799edace5d2cb648eef2b179842

  • Size

    287KB

  • Sample

    220508-tc9ygaedep

  • MD5

    ae52c1b6b07abf7ebdc21931f23fa50c

  • SHA1

    0bd8e7d5f59dec11839420cb0efa194b7029fd54

  • SHA256

    2443e2650a14ab28210e18bdb906646279a03799edace5d2cb648eef2b179842

  • SHA512

    fa9ecc0dee08106858565d67649e4f53659a751eff15db4344ca1a17c8969401467569f5df202975fd000d3af8e1cb6dcfc21ffaf96b078dcc2028d3cf29473c

Malware Config

Extracted

Family

icedid

C2

loadpascal.asia

Targets

    • Target

      2443e2650a14ab28210e18bdb906646279a03799edace5d2cb648eef2b179842

    • Size

      287KB

    • MD5

      ae52c1b6b07abf7ebdc21931f23fa50c

    • SHA1

      0bd8e7d5f59dec11839420cb0efa194b7029fd54

    • SHA256

      2443e2650a14ab28210e18bdb906646279a03799edace5d2cb648eef2b179842

    • SHA512

      fa9ecc0dee08106858565d67649e4f53659a751eff15db4344ca1a17c8969401467569f5df202975fd000d3af8e1cb6dcfc21ffaf96b078dcc2028d3cf29473c

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

    • Blocklisted process makes network request

MITRE ATT&CK Matrix

Tasks