General

  • Target

    318150494babb93cda546cba4496d5324c51b624d3c597b0606ad7064248a68a

  • Size

    534KB

  • Sample

    220707-vvtvmscdfp

  • MD5

    b675368c1a7607b896aabfd16b17fcaa

  • SHA1

    c66a53a799e1af431da7934da36e900ee32bc446

  • SHA256

    318150494babb93cda546cba4496d5324c51b624d3c597b0606ad7064248a68a

  • SHA512

    91ec1b78c64a4861188703ad7ccbc80317ed9ed35cea5322b4ca044de18199810e0d7f740cc6a35ebc1f4650c88819f27b2c9ca4593f65fe5361f6a1404e8f3c

Malware Config

Extracted

Family

icedid

Campaign

227378761

C2

blionarywesta.com

Targets

    • Target

      318150494babb93cda546cba4496d5324c51b624d3c597b0606ad7064248a68a

    • Size

      534KB

    • MD5

      b675368c1a7607b896aabfd16b17fcaa

    • SHA1

      c66a53a799e1af431da7934da36e900ee32bc446

    • SHA256

      318150494babb93cda546cba4496d5324c51b624d3c597b0606ad7064248a68a

    • SHA512

      91ec1b78c64a4861188703ad7ccbc80317ed9ed35cea5322b4ca044de18199810e0d7f740cc6a35ebc1f4650c88819f27b2c9ca4593f65fe5361f6a1404e8f3c

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • suricata: ET MALWARE Win32/IcedID Request Cookie

      suricata: ET MALWARE Win32/IcedID Request Cookie

    • Blocklisted process makes network request

MITRE ATT&CK Matrix

Tasks