General

  • Target

    2dd17fa59c875995931502b37818c967b578b6429eb0fd7692f35774442d78f1

  • Size

    534KB

  • Sample

    220707-vrydnacccn

  • MD5

    525b28ec314cd8e9b4a91c42ee69a9a0

  • SHA1

    5487fbaa6371b10b7e300943bb0906c08c30cea9

  • SHA256

    2dd17fa59c875995931502b37818c967b578b6429eb0fd7692f35774442d78f1

  • SHA512

    e3a0b30eb363c20c18a18c953c8301c960e54d110486ac5b7368d77ef7918f4d2e52c15caf44e19fa4d3bb9945fb9e2e19a4a201477dc882173bdaec9997359e

Malware Config

Extracted

Family

icedid

Campaign

227378761

C2

blionarywesta.com

Targets

    • Target

      2dd17fa59c875995931502b37818c967b578b6429eb0fd7692f35774442d78f1

    • Size

      534KB

    • MD5

      525b28ec314cd8e9b4a91c42ee69a9a0

    • SHA1

      5487fbaa6371b10b7e300943bb0906c08c30cea9

    • SHA256

      2dd17fa59c875995931502b37818c967b578b6429eb0fd7692f35774442d78f1

    • SHA512

      e3a0b30eb363c20c18a18c953c8301c960e54d110486ac5b7368d77ef7918f4d2e52c15caf44e19fa4d3bb9945fb9e2e19a4a201477dc882173bdaec9997359e

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • suricata: ET MALWARE Win32/IcedID Request Cookie

      suricata: ET MALWARE Win32/IcedID Request Cookie

    • Blocklisted process makes network request

MITRE ATT&CK Matrix

Tasks