General

  • Target

    9574cc4740c03374c0fedea7f6799b1adc97cd52d072514ad8d2bb9f35c30b7d

  • Size

    224KB

  • Sample

    220524-3g744sfebk

  • MD5

    bb88a9438617cedd24f610e306e8649f

  • SHA1

    6f97f95e803caa92f8ef91c27927b299c3c1c54b

  • SHA256

    9574cc4740c03374c0fedea7f6799b1adc97cd52d072514ad8d2bb9f35c30b7d

  • SHA512

    046810911496c2fc84d71de62ae4436110ed3ed48404790febddffe417c6563a95768d22218110eb4954f9f67becd52b3b614d7b1ebecdf2b6f83f203fdb919e

Malware Config

Extracted

Family

icedid

C2

loadberlin.casa

Targets

    • Target

      9574cc4740c03374c0fedea7f6799b1adc97cd52d072514ad8d2bb9f35c30b7d

    • Size

      224KB

    • MD5

      bb88a9438617cedd24f610e306e8649f

    • SHA1

      6f97f95e803caa92f8ef91c27927b299c3c1c54b

    • SHA256

      9574cc4740c03374c0fedea7f6799b1adc97cd52d072514ad8d2bb9f35c30b7d

    • SHA512

      046810911496c2fc84d71de62ae4436110ed3ed48404790febddffe417c6563a95768d22218110eb4954f9f67becd52b3b614d7b1ebecdf2b6f83f203fdb919e

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

    • Blocklisted process makes network request

MITRE ATT&CK Matrix

Tasks