General

  • Target

    striking.dll.exe

  • Size

    358KB

  • Sample

    220926-mkdfxaadh7

  • MD5

    464399e3cbd82cd6cfb4bd5217ed9913

  • SHA1

    a156d478f98ea754e448ca82dc5376832ed801e5

  • SHA256

    bcdb22780334fafe85b8f5d41f1e9d3fcc599e84d00e08605d97a7da240b5708

  • SHA512

    1b5a230bc1b69904ad462190e141705678896498887252ad3dafcd8e917b64291779e75048e5e4c58b682bb27e6acb9fc32408ba868b0c05b653192c7cd1eb25

  • SSDEEP

    6144:4nXcJHP7csJqGGCfXJo0w4wNfL75I2iiXUw0JFY4npeGm:AOHP7tJp0762QlAJ

Malware Config

Extracted

Family

icedid

Campaign

1367965656

C2

nikolandfantazy.com

Targets

    • Target

      striking.dll.exe

    • Size

      358KB

    • MD5

      464399e3cbd82cd6cfb4bd5217ed9913

    • SHA1

      a156d478f98ea754e448ca82dc5376832ed801e5

    • SHA256

      bcdb22780334fafe85b8f5d41f1e9d3fcc599e84d00e08605d97a7da240b5708

    • SHA512

      1b5a230bc1b69904ad462190e141705678896498887252ad3dafcd8e917b64291779e75048e5e4c58b682bb27e6acb9fc32408ba868b0c05b653192c7cd1eb25

    • SSDEEP

      6144:4nXcJHP7csJqGGCfXJo0w4wNfL75I2iiXUw0JFY4npeGm:AOHP7tJp0762QlAJ

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix

Tasks