General

  • Target

    414f8facf086eb38c69916d92ff1ab7f.dll.exe

  • Size

    243KB

  • Sample

    220918-q8pevsfcbm

  • MD5

    414f8facf086eb38c69916d92ff1ab7f

  • SHA1

    5d5eb37e59721976e50e3c67605a6bfae2111bf3

  • SHA256

    6801de84321e6392152683399a7577572710895f67813c6101ded8093cbb32ee

  • SHA512

    8b65c7f045fc1d26512d311e52cca2c118dd6bf4c3dfe1a404e6d04498b9ae66b024c205554e48b39042a0efd7b90087e8eb2574707beacb407a9cfa67b44e96

  • SSDEEP

    3072:EgyPm+PU16y0a724xuIKhloD+T2GhQOiEhzCOQJzkQhUzI3d2WhmEW:EZO+K6yhIyMvhG2QyV

Malware Config

Extracted

Family

icedid

Campaign

809191839

C2

allozelkot.com

Targets

    • Target

      414f8facf086eb38c69916d92ff1ab7f.dll.exe

    • Size

      243KB

    • MD5

      414f8facf086eb38c69916d92ff1ab7f

    • SHA1

      5d5eb37e59721976e50e3c67605a6bfae2111bf3

    • SHA256

      6801de84321e6392152683399a7577572710895f67813c6101ded8093cbb32ee

    • SHA512

      8b65c7f045fc1d26512d311e52cca2c118dd6bf4c3dfe1a404e6d04498b9ae66b024c205554e48b39042a0efd7b90087e8eb2574707beacb407a9cfa67b44e96

    • SSDEEP

      3072:EgyPm+PU16y0a724xuIKhloD+T2GhQOiEhzCOQJzkQhUzI3d2WhmEW:EZO+K6yhIyMvhG2QyV

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix

Tasks