General

  • Target

    6295c4fe148ad.tiff

  • Size

    480KB

  • Sample

    220531-jeej8sedgm

  • MD5

    3f7a7b648363742a6498588e338ea290

  • SHA1

    7ed5e8cdf04d92f794b722bf09dbb661b34a052a

  • SHA256

    381072d29730eb576f1e70fc66e24836153b0ffb3b221bc7f48249eea94fc0c0

  • SHA512

    37f850c2cc33613c08782516bbbf508052274be757ee900c52fa9daae563ad011824271301e9f2e3edcd93cf9f0a447b794a593e9d0fb1ed6c4e858872635ef2

Malware Config

Extracted

Family

icedid

Campaign

2581925242

C2

uleoballs.com

Targets

    • Target

      6295c4fe148ad.tiff

    • Size

      480KB

    • MD5

      3f7a7b648363742a6498588e338ea290

    • SHA1

      7ed5e8cdf04d92f794b722bf09dbb661b34a052a

    • SHA256

      381072d29730eb576f1e70fc66e24836153b0ffb3b221bc7f48249eea94fc0c0

    • SHA512

      37f850c2cc33613c08782516bbbf508052274be757ee900c52fa9daae563ad011824271301e9f2e3edcd93cf9f0a447b794a593e9d0fb1ed6c4e858872635ef2

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • suricata: ET MALWARE Win32/IcedID Request Cookie

      suricata: ET MALWARE Win32/IcedID Request Cookie

    • Blocklisted process makes network request

MITRE ATT&CK Matrix

Tasks