General

  • Target

    d95157d82c9f5aef0274334b0fff8530b82ddab21ad080010a21c972d8207f26

  • Size

    534KB

  • Sample

    220707-vrpfraccbj

  • MD5

    4191dd5636d7585cbe6a11956c254800

  • SHA1

    6cbfc627d0cd7473ffd8659907582adb22b39197

  • SHA256

    d95157d82c9f5aef0274334b0fff8530b82ddab21ad080010a21c972d8207f26

  • SHA512

    2fce1d1b7e8483169a9fc50bdadaceae63327ba633fa6588e33e377be7dfb00e37c2cb6996af41a2d9c0bad00f77b38a55c1d73e48295490b9b0b01fde3f885c

Malware Config

Extracted

Family

icedid

Campaign

227378761

C2

blionarywesta.com

Targets

    • Target

      d95157d82c9f5aef0274334b0fff8530b82ddab21ad080010a21c972d8207f26

    • Size

      534KB

    • MD5

      4191dd5636d7585cbe6a11956c254800

    • SHA1

      6cbfc627d0cd7473ffd8659907582adb22b39197

    • SHA256

      d95157d82c9f5aef0274334b0fff8530b82ddab21ad080010a21c972d8207f26

    • SHA512

      2fce1d1b7e8483169a9fc50bdadaceae63327ba633fa6588e33e377be7dfb00e37c2cb6996af41a2d9c0bad00f77b38a55c1d73e48295490b9b0b01fde3f885c

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • suricata: ET MALWARE Win32/IcedID Request Cookie

      suricata: ET MALWARE Win32/IcedID Request Cookie

    • Blocklisted process makes network request

MITRE ATT&CK Matrix

Tasks