General

  • Target

    a5151235572cb7361f76be397f78219464f5cf04c8318a04d5c02afc4e3a45bf

  • Size

    536KB

  • Sample

    220707-vs55wscchl

  • MD5

    6d25742811fa6202920e4439765c3592

  • SHA1

    3cd9da5795258996a65e09a73f882fb928fbe9bf

  • SHA256

    a5151235572cb7361f76be397f78219464f5cf04c8318a04d5c02afc4e3a45bf

  • SHA512

    f9bb973a609dbd60e17a062a2cc0280780926317fbfa26b3ba9d47b1662c251ac7aa68ed74ed41866c1f8cada3e778ba700915300e66cffb4e797328484822a4

Malware Config

Extracted

Family

icedid

Campaign

227378761

C2

blionarywesta.com

Targets

    • Target

      a5151235572cb7361f76be397f78219464f5cf04c8318a04d5c02afc4e3a45bf

    • Size

      536KB

    • MD5

      6d25742811fa6202920e4439765c3592

    • SHA1

      3cd9da5795258996a65e09a73f882fb928fbe9bf

    • SHA256

      a5151235572cb7361f76be397f78219464f5cf04c8318a04d5c02afc4e3a45bf

    • SHA512

      f9bb973a609dbd60e17a062a2cc0280780926317fbfa26b3ba9d47b1662c251ac7aa68ed74ed41866c1f8cada3e778ba700915300e66cffb4e797328484822a4

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • suricata: ET MALWARE Win32/IcedID Request Cookie

      suricata: ET MALWARE Win32/IcedID Request Cookie

    • Blocklisted process makes network request

MITRE ATT&CK Matrix

Tasks