General

  • Target

    f733d53791eac3af5dade593ac263ada

  • Size

    480KB

  • Sample

    220531-kg1e6aage6

  • MD5

    f733d53791eac3af5dade593ac263ada

  • SHA1

    9231f9ed4a47c89d638947b6f5aa9c86306863c2

  • SHA256

    e75fd278008b59ee6b0377088ec244e2f0f0c8ef43db19eb31070002e71fbd23

  • SHA512

    d9618b35c29470992b9876226e4544f3a95786dee9f1d48de8f7c5c6941b33831a5843037608b5090e34a9f829fcc9a89d5c95fc100dbf0f60823282ba12a362

Malware Config

Extracted

Family

icedid

Campaign

2581925242

C2

uleoballs.com

Targets

    • Target

      f733d53791eac3af5dade593ac263ada

    • Size

      480KB

    • MD5

      f733d53791eac3af5dade593ac263ada

    • SHA1

      9231f9ed4a47c89d638947b6f5aa9c86306863c2

    • SHA256

      e75fd278008b59ee6b0377088ec244e2f0f0c8ef43db19eb31070002e71fbd23

    • SHA512

      d9618b35c29470992b9876226e4544f3a95786dee9f1d48de8f7c5c6941b33831a5843037608b5090e34a9f829fcc9a89d5c95fc100dbf0f60823282ba12a362

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • suricata: ET MALWARE Win32/IcedID Request Cookie

      suricata: ET MALWARE Win32/IcedID Request Cookie

    • Blocklisted process makes network request

MITRE ATT&CK Matrix

Tasks