General

  • Target

    22ed6a6eb8415c9c1d24d535d435428200729879c692c8b4ca88e0717755bf98

  • Size

    534KB

  • Sample

    220707-vqyb9sebc7

  • MD5

    ce04eacbe042a07d4cd5f551355cffc8

  • SHA1

    2cc00d35febb8ee6fe3b31799ce3419ed46a1a24

  • SHA256

    22ed6a6eb8415c9c1d24d535d435428200729879c692c8b4ca88e0717755bf98

  • SHA512

    7a076a8bf221051fbc06509cd94f21aeaea6d4d4ea82bd2d08e44516c134c1f830c035a0855cd8791376b0cc58a0d67a15f531b58f4677c90ca183edb7315b8c

Malware Config

Extracted

Family

icedid

Campaign

227378761

C2

blionarywesta.com

Targets

    • Target

      22ed6a6eb8415c9c1d24d535d435428200729879c692c8b4ca88e0717755bf98

    • Size

      534KB

    • MD5

      ce04eacbe042a07d4cd5f551355cffc8

    • SHA1

      2cc00d35febb8ee6fe3b31799ce3419ed46a1a24

    • SHA256

      22ed6a6eb8415c9c1d24d535d435428200729879c692c8b4ca88e0717755bf98

    • SHA512

      7a076a8bf221051fbc06509cd94f21aeaea6d4d4ea82bd2d08e44516c134c1f830c035a0855cd8791376b0cc58a0d67a15f531b58f4677c90ca183edb7315b8c

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • suricata: ET MALWARE Win32/IcedID Request Cookie

      suricata: ET MALWARE Win32/IcedID Request Cookie

    • Blocklisted process makes network request

MITRE ATT&CK Matrix

Tasks