General

  • Target

    laid.db.exe

  • Size

    317KB

  • Sample

    220923-f5e2xadcb7

  • MD5

    cc7be5d1ea14ba7c0d36496ad158d08d

  • SHA1

    76f0e8e55a7d8de5a7064e25ea5fea086adca025

  • SHA256

    61d6a2ac59a1cfa2890f2ccd67d8ae292cad575dbe19e843a05beb6a968d17d3

  • SHA512

    b4a416d46831a0cf4eb4bb10e86059f079691a846d58a5cc9221b067a3a357d0314da0ac91cd7fa0ded655c0216d5f182939d982515a988c4e1008f48ca176bb

  • SSDEEP

    6144:qrA2m2kP7+sOjcroyI0xwlh8boidmQp1tRdnjU8bk:q82/kP7yj1kuvcU8Q

Malware Config

Extracted

Family

icedid

Campaign

1023645195

C2

trallfasterinf.com

Targets

    • Target

      laid.db.exe

    • Size

      317KB

    • MD5

      cc7be5d1ea14ba7c0d36496ad158d08d

    • SHA1

      76f0e8e55a7d8de5a7064e25ea5fea086adca025

    • SHA256

      61d6a2ac59a1cfa2890f2ccd67d8ae292cad575dbe19e843a05beb6a968d17d3

    • SHA512

      b4a416d46831a0cf4eb4bb10e86059f079691a846d58a5cc9221b067a3a357d0314da0ac91cd7fa0ded655c0216d5f182939d982515a988c4e1008f48ca176bb

    • SSDEEP

      6144:qrA2m2kP7+sOjcroyI0xwlh8boidmQp1tRdnjU8bk:q82/kP7yj1kuvcU8Q

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix

Tasks