General

  • Target

    2364vg755gh443.dll

  • Size

    480KB

  • Sample

    220531-j4earseebm

  • MD5

    30735c0ab9596e2452c2793fb64d8a47

  • SHA1

    86838f63bd299f1eead9ddff69797d4d613819f8

  • SHA256

    9f273a362a97856a64074278ea72672782567ff743d140b839504a841db810c2

  • SHA512

    4e64eb287df13e3502418b5a8aadffc810501969658aaa953b1bb4dc8fa302b64d52dbba7795055ba1986980e896fb22f4407c2c74e3b86327f10d7983d5a962

Malware Config

Extracted

Family

icedid

Campaign

2581925242

C2

uleoballs.com

Targets

    • Target

      2364vg755gh443.dll

    • Size

      480KB

    • MD5

      30735c0ab9596e2452c2793fb64d8a47

    • SHA1

      86838f63bd299f1eead9ddff69797d4d613819f8

    • SHA256

      9f273a362a97856a64074278ea72672782567ff743d140b839504a841db810c2

    • SHA512

      4e64eb287df13e3502418b5a8aadffc810501969658aaa953b1bb4dc8fa302b64d52dbba7795055ba1986980e896fb22f4407c2c74e3b86327f10d7983d5a962

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • suricata: ET MALWARE Win32/IcedID Request Cookie

      suricata: ET MALWARE Win32/IcedID Request Cookie

    • Blocklisted process makes network request

MITRE ATT&CK Matrix

Tasks