General

  • Target

    e0cf9d9740fec745eecd0a39592e84e4a76b023e5ac84a98757adff8fb1f1db4

  • Size

    534KB

  • Sample

    220707-vreasacbhq

  • MD5

    f9d50e3f72c079aaa4e51740a412a8da

  • SHA1

    24210e6b3ec490a8189cfac23e741899efecb77c

  • SHA256

    e0cf9d9740fec745eecd0a39592e84e4a76b023e5ac84a98757adff8fb1f1db4

  • SHA512

    2515b05ab5bdc07e405d3186b02f92f73019db765abded31bbe9e0a3078acc4c32394700d8c1ec01c271c9009a11f7080478e4b2fac5ba68ed597cad16aab9df

Malware Config

Extracted

Family

icedid

Campaign

227378761

C2

blionarywesta.com

Targets

    • Target

      e0cf9d9740fec745eecd0a39592e84e4a76b023e5ac84a98757adff8fb1f1db4

    • Size

      534KB

    • MD5

      f9d50e3f72c079aaa4e51740a412a8da

    • SHA1

      24210e6b3ec490a8189cfac23e741899efecb77c

    • SHA256

      e0cf9d9740fec745eecd0a39592e84e4a76b023e5ac84a98757adff8fb1f1db4

    • SHA512

      2515b05ab5bdc07e405d3186b02f92f73019db765abded31bbe9e0a3078acc4c32394700d8c1ec01c271c9009a11f7080478e4b2fac5ba68ed597cad16aab9df

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • suricata: ET MALWARE Win32/IcedID Request Cookie

      suricata: ET MALWARE Win32/IcedID Request Cookie

    • Blocklisted process makes network request

MITRE ATT&CK Matrix

Tasks