General

  • Target

    6295fa2e1d4b3.tiff

  • Size

    480KB

  • Sample

    220531-ngme3segbq

  • MD5

    5fb757a75752e18aaf7841896779276d

  • SHA1

    828c3a63d11563c0c85bc8efad1c60efed0b5fb7

  • SHA256

    8296f7e07751f7626dc56c5f82dcce00578a8c8f9c50bf5923b69bc3f571ffc5

  • SHA512

    ce653d450cd26dd4edf6e571ab734a1de6cba0f9c70e72b08ce5764b7d6407497c6892c6cab4e710e515a992a00707d56d90256cc67a9ea656e6a6fc1ddab7fd

Malware Config

Extracted

Family

icedid

Campaign

2581925242

C2

uleoballs.com

Targets

    • Target

      6295fa2e1d4b3.tiff

    • Size

      480KB

    • MD5

      5fb757a75752e18aaf7841896779276d

    • SHA1

      828c3a63d11563c0c85bc8efad1c60efed0b5fb7

    • SHA256

      8296f7e07751f7626dc56c5f82dcce00578a8c8f9c50bf5923b69bc3f571ffc5

    • SHA512

      ce653d450cd26dd4edf6e571ab734a1de6cba0f9c70e72b08ce5764b7d6407497c6892c6cab4e710e515a992a00707d56d90256cc67a9ea656e6a6fc1ddab7fd

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • suricata: ET MALWARE Win32/IcedID Request Cookie

      suricata: ET MALWARE Win32/IcedID Request Cookie

    • Blocklisted process makes network request

MITRE ATT&CK Matrix

Tasks