General

  • Target

    7287387845476394829823.dll

  • Size

    675KB

  • Sample

    220705-zz56padaej

  • MD5

    d9ca0b8b3d18b348148b81766f34971b

  • SHA1

    eaebf971a37f05268f73611d248c6b6047d8bb13

  • SHA256

    3ff865046c458de3a317ecedaad6aa0e60d5d36f8fcc8bfa6d4cff42efa3c3ed

  • SHA512

    941e5d5c2c06e57bb8a88643b140332c2fbc51c9d435825576b7ac02f929c5f6f235149e382a8dbaf12c8a39afbc03e3526cb582b43b026ced33e24e88d02551

Malware Config

Extracted

Family

icedid

Campaign

1175749654

C2

hlansmagazine.com

Targets

    • Target

      7287387845476394829823.dll

    • Size

      675KB

    • MD5

      d9ca0b8b3d18b348148b81766f34971b

    • SHA1

      eaebf971a37f05268f73611d248c6b6047d8bb13

    • SHA256

      3ff865046c458de3a317ecedaad6aa0e60d5d36f8fcc8bfa6d4cff42efa3c3ed

    • SHA512

      941e5d5c2c06e57bb8a88643b140332c2fbc51c9d435825576b7ac02f929c5f6f235149e382a8dbaf12c8a39afbc03e3526cb582b43b026ced33e24e88d02551

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • suricata: ET MALWARE Win32/IcedID Request Cookie

      suricata: ET MALWARE Win32/IcedID Request Cookie

    • Blocklisted process makes network request

MITRE ATT&CK Matrix

Tasks