General

  • Target

    h1mor3.dll

  • Size

    813KB

  • Sample

    220706-3twlvacga8

  • MD5

    758d6fd71861183a47a71d8d706d2d8b

  • SHA1

    8321eaa1042b6ffdb1356b1e0132067ffd678a48

  • SHA256

    cc9519da166d7bbcf29c4fa9503ef1df15255c6b07260442cef603316b84ed01

  • SHA512

    38218cb5c3ac187fd39b142bac8ca03542e0bd82c0fb012226884ff8c0bed4ec088b3b994d16fa4c9d4e65d687154883f20796fb2b424dadbccefa43a074cb3b

Malware Config

Extracted

Family

icedid

Campaign

4105767744

C2

frodupshopping.com

Targets

    • Target

      h1mor3.dll

    • Size

      813KB

    • MD5

      758d6fd71861183a47a71d8d706d2d8b

    • SHA1

      8321eaa1042b6ffdb1356b1e0132067ffd678a48

    • SHA256

      cc9519da166d7bbcf29c4fa9503ef1df15255c6b07260442cef603316b84ed01

    • SHA512

      38218cb5c3ac187fd39b142bac8ca03542e0bd82c0fb012226884ff8c0bed4ec088b3b994d16fa4c9d4e65d687154883f20796fb2b424dadbccefa43a074cb3b

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • suricata: ET MALWARE Win32/IcedID Request Cookie

      suricata: ET MALWARE Win32/IcedID Request Cookie

    • Blocklisted process makes network request

MITRE ATT&CK Matrix

Tasks