General

  • Target

    c7cf32f1a17f0f936a5f67418b51f03e9a5d42a376caa46a3aaa2e4c9688173c

  • Size

    165KB

  • Sample

    220511-dg65daghdq

  • MD5

    7d99ebf5171054504f3334e1317a763d

  • SHA1

    893504b39f7b53a455e7b369ac05957ae7865221

  • SHA256

    c7cf32f1a17f0f936a5f67418b51f03e9a5d42a376caa46a3aaa2e4c9688173c

  • SHA512

    9e950b98cd99e3c782cf586720a9fb7e61807c5c13bef76956a360402f8a845371cd27b91e6306977fc1480720ff192e955fd187853c2f52ba53440fc564ccfd

Malware Config

Extracted

Family

icedid

C2

loadboeing.click

Targets

    • Target

      c7cf32f1a17f0f936a5f67418b51f03e9a5d42a376caa46a3aaa2e4c9688173c

    • Size

      165KB

    • MD5

      7d99ebf5171054504f3334e1317a763d

    • SHA1

      893504b39f7b53a455e7b369ac05957ae7865221

    • SHA256

      c7cf32f1a17f0f936a5f67418b51f03e9a5d42a376caa46a3aaa2e4c9688173c

    • SHA512

      9e950b98cd99e3c782cf586720a9fb7e61807c5c13bef76956a360402f8a845371cd27b91e6306977fc1480720ff192e955fd187853c2f52ba53440fc564ccfd

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

MITRE ATT&CK Matrix

Tasks