General

  • Target

    4137.dll

  • Size

    480KB

  • Sample

    220531-v61gkafehk

  • MD5

    93d831598f186a9da102aee5a4ed3282

  • SHA1

    29331947d50beb1bc29731b9acd0ff28827f5a81

  • SHA256

    b09360897305f1076d7e5cdda72c25fd92624a883aa7439156bc68f1646f3597

  • SHA512

    8620285ac33c3da095a46eb53ded1612571f9691d907baa7710f325ccaa10026f3fe9cdf1dbd167fe92e56a6b712e988df63da9ae5231d6082d2a9c52a235962

Malware Config

Extracted

Family

icedid

Campaign

2581925242

C2

uleoballs.com

Targets

    • Target

      4137.dll

    • Size

      480KB

    • MD5

      93d831598f186a9da102aee5a4ed3282

    • SHA1

      29331947d50beb1bc29731b9acd0ff28827f5a81

    • SHA256

      b09360897305f1076d7e5cdda72c25fd92624a883aa7439156bc68f1646f3597

    • SHA512

      8620285ac33c3da095a46eb53ded1612571f9691d907baa7710f325ccaa10026f3fe9cdf1dbd167fe92e56a6b712e988df63da9ae5231d6082d2a9c52a235962

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • suricata: ET MALWARE Win32/IcedID Request Cookie

      suricata: ET MALWARE Win32/IcedID Request Cookie

    • Blocklisted process makes network request

MITRE ATT&CK Matrix

Tasks