General

  • Target

    8sLDJbfC.4Ct112

  • Size

    534KB

  • Sample

    220707-v1d2dacgam

  • MD5

    c4a9b4f3254be77448f72272765757c7

  • SHA1

    40d1d12fe46a0b144f7f4bbb9fcb2a758c141e20

  • SHA256

    36bd0d4b2148e6e63469a8f4d5e627224999b1cd65bd0bb760246da35f89147b

  • SHA512

    645a7e75b5075febb232fd2b66a128ed0bfcdb710e8340553babd9a86d768404695ab1a0424d29e99d798cdb073626daf0a544558766d809aba70d8381218fc4

Malware Config

Extracted

Family

icedid

Campaign

227378761

C2

blionarywesta.com

Targets

    • Target

      8sLDJbfC.4Ct112

    • Size

      534KB

    • MD5

      c4a9b4f3254be77448f72272765757c7

    • SHA1

      40d1d12fe46a0b144f7f4bbb9fcb2a758c141e20

    • SHA256

      36bd0d4b2148e6e63469a8f4d5e627224999b1cd65bd0bb760246da35f89147b

    • SHA512

      645a7e75b5075febb232fd2b66a128ed0bfcdb710e8340553babd9a86d768404695ab1a0424d29e99d798cdb073626daf0a544558766d809aba70d8381218fc4

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • suricata: ET MALWARE Win32/IcedID Request Cookie

      suricata: ET MALWARE Win32/IcedID Request Cookie

    • Blocklisted process makes network request

MITRE ATT&CK Matrix

Tasks