General

  • Target

    b4efdf218614a9189ef9315fc8fcf283154cb91b385e4739cae0fb62a0a36f43

  • Size

    534KB

  • Sample

    220707-vr61ssccdp

  • MD5

    3f978fd13fed28e1cfac8619e8cac2f0

  • SHA1

    670a29a981f91502499272aec6e42db162dd48ba

  • SHA256

    b4efdf218614a9189ef9315fc8fcf283154cb91b385e4739cae0fb62a0a36f43

  • SHA512

    44dc36952ebff8351a4fd2bd7fed2c95f054f4b93d07fc61388fef39a775df1822f5de55b18029b996366c9a25d3eedb2f0844849af1a436cd551a5710caa75e

Malware Config

Extracted

Family

icedid

Campaign

227378761

C2

blionarywesta.com

Targets

    • Target

      b4efdf218614a9189ef9315fc8fcf283154cb91b385e4739cae0fb62a0a36f43

    • Size

      534KB

    • MD5

      3f978fd13fed28e1cfac8619e8cac2f0

    • SHA1

      670a29a981f91502499272aec6e42db162dd48ba

    • SHA256

      b4efdf218614a9189ef9315fc8fcf283154cb91b385e4739cae0fb62a0a36f43

    • SHA512

      44dc36952ebff8351a4fd2bd7fed2c95f054f4b93d07fc61388fef39a775df1822f5de55b18029b996366c9a25d3eedb2f0844849af1a436cd551a5710caa75e

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • suricata: ET MALWARE Win32/IcedID Request Cookie

      suricata: ET MALWARE Win32/IcedID Request Cookie

    • Blocklisted process makes network request

MITRE ATT&CK Matrix

Tasks