General

  • Target

    51e1c08b289ffbbb4b22b1b2033b141c6bbb3c5bb11cbedf99dc208ef3688c73

  • Size

    536KB

  • Sample

    220707-vtmpyacdbn

  • MD5

    e01dd729a9c38327348dc51a93a88038

  • SHA1

    d56febb92285668be669acf953d26ea22529adaa

  • SHA256

    51e1c08b289ffbbb4b22b1b2033b141c6bbb3c5bb11cbedf99dc208ef3688c73

  • SHA512

    f753a92eeaf996b2af1947fe53f2aaafb1b15ab07cddc35ea00900add7c2bc7c7c7b667c3572a671ce6e66833f52a35485b276c7091111dbf82aec00e9b3d2a7

Malware Config

Extracted

Family

icedid

Campaign

227378761

C2

blionarywesta.com

Targets

    • Target

      51e1c08b289ffbbb4b22b1b2033b141c6bbb3c5bb11cbedf99dc208ef3688c73

    • Size

      536KB

    • MD5

      e01dd729a9c38327348dc51a93a88038

    • SHA1

      d56febb92285668be669acf953d26ea22529adaa

    • SHA256

      51e1c08b289ffbbb4b22b1b2033b141c6bbb3c5bb11cbedf99dc208ef3688c73

    • SHA512

      f753a92eeaf996b2af1947fe53f2aaafb1b15ab07cddc35ea00900add7c2bc7c7c7b667c3572a671ce6e66833f52a35485b276c7091111dbf82aec00e9b3d2a7

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • suricata: ET MALWARE Win32/IcedID Request Cookie

      suricata: ET MALWARE Win32/IcedID Request Cookie

    • Blocklisted process makes network request

MITRE ATT&CK Matrix

Tasks