General

  • Target

    f837870c2ee91e7cbd491d8c5b62aa8cbd0276b1c9bab8a6af78d907ccd4ec0e

  • Size

    534KB

  • Sample

    220707-vtdr2acdap

  • MD5

    0c2acbe5d1f3703f6cbd28fb953adeb9

  • SHA1

    c4186395362f7fa8056ecd8069dfc91b03ccd165

  • SHA256

    f837870c2ee91e7cbd491d8c5b62aa8cbd0276b1c9bab8a6af78d907ccd4ec0e

  • SHA512

    b803d12bf88c58c1af498d5c29fd9bf337c117e1e0214a63ffcbbe85f57bcaa07fedaec20e53484ccfb7d5d073fb62bc1ceb156d5f6eb72929e7238373865214

Malware Config

Extracted

Family

icedid

Campaign

227378761

C2

blionarywesta.com

Targets

    • Target

      f837870c2ee91e7cbd491d8c5b62aa8cbd0276b1c9bab8a6af78d907ccd4ec0e

    • Size

      534KB

    • MD5

      0c2acbe5d1f3703f6cbd28fb953adeb9

    • SHA1

      c4186395362f7fa8056ecd8069dfc91b03ccd165

    • SHA256

      f837870c2ee91e7cbd491d8c5b62aa8cbd0276b1c9bab8a6af78d907ccd4ec0e

    • SHA512

      b803d12bf88c58c1af498d5c29fd9bf337c117e1e0214a63ffcbbe85f57bcaa07fedaec20e53484ccfb7d5d073fb62bc1ceb156d5f6eb72929e7238373865214

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • suricata: ET MALWARE Win32/IcedID Request Cookie

      suricata: ET MALWARE Win32/IcedID Request Cookie

    • Blocklisted process makes network request

MITRE ATT&CK Matrix

Tasks