General

  • Target

    3203.dll

  • Size

    807KB

  • Sample

    220615-3vx63aghb8

  • MD5

    63b610a3a9006160e270f8e7ad0db03f

  • SHA1

    d1dc6ab79aa4b5affcd13cc876bcc60bac9b45d4

  • SHA256

    a746ab385c513d0f73076ed4f83ac9e4e286ca7a8e5d6a5a4f0062026039b265

  • SHA512

    0f440abc39352c077bcdc899872ddea2c0069c173d028fda5e0b790f6a8b4aba2eca0fd557c5b6e1d2e645e90a3c883bc664308886ff6c2b371ea59e6b10cd28

Malware Config

Extracted

Family

icedid

Campaign

260931076

C2

ilekvoyn.com

Targets

    • Target

      3203.dll

    • Size

      807KB

    • MD5

      63b610a3a9006160e270f8e7ad0db03f

    • SHA1

      d1dc6ab79aa4b5affcd13cc876bcc60bac9b45d4

    • SHA256

      a746ab385c513d0f73076ed4f83ac9e4e286ca7a8e5d6a5a4f0062026039b265

    • SHA512

      0f440abc39352c077bcdc899872ddea2c0069c173d028fda5e0b790f6a8b4aba2eca0fd557c5b6e1d2e645e90a3c883bc664308886ff6c2b371ea59e6b10cd28

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • suricata: ET MALWARE Win32/IcedID Request Cookie

      suricata: ET MALWARE Win32/IcedID Request Cookie

    • Blocklisted process makes network request

MITRE ATT&CK Matrix

Tasks