General

  • Target

    73640f9d8686965056ae4be0c4018d72.dll

  • Size

    534KB

  • Sample

    220708-m99kmseaf6

  • MD5

    73640f9d8686965056ae4be0c4018d72

  • SHA1

    4ba9d78f9b8ce2b254fef41ebf18af91fb157233

  • SHA256

    534dfd7e720ebb884d139893622d41398acc4a9743f7eb0daf9feed4aed77c3d

  • SHA512

    d04d17951282c0700a3e1526e3f109f2eef920176d48d3f261640eb052f670b8b7136f181cac4d2898334d6ee2bf7113758f1208d7a44f02b8dfcaf6192abc36

Malware Config

Extracted

Family

icedid

Campaign

227378761

C2

blionarywesta.com

Targets

    • Target

      73640f9d8686965056ae4be0c4018d72.dll

    • Size

      534KB

    • MD5

      73640f9d8686965056ae4be0c4018d72

    • SHA1

      4ba9d78f9b8ce2b254fef41ebf18af91fb157233

    • SHA256

      534dfd7e720ebb884d139893622d41398acc4a9743f7eb0daf9feed4aed77c3d

    • SHA512

      d04d17951282c0700a3e1526e3f109f2eef920176d48d3f261640eb052f670b8b7136f181cac4d2898334d6ee2bf7113758f1208d7a44f02b8dfcaf6192abc36

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • suricata: ET MALWARE Win32/IcedID Request Cookie

      suricata: ET MALWARE Win32/IcedID Request Cookie

    • Blocklisted process makes network request

MITRE ATT&CK Matrix

Tasks