General

  • Target

    avers.db

  • Size

    532KB

  • Sample

    220926-vtv2babdf6

  • MD5

    8201f1bfd204972dd1c2cb989a7c8cdf

  • SHA1

    73ae0872d685685e2395894c743df925dcfd19d6

  • SHA256

    39af395246a555cdca505f3b7358db16b107bd186b9cbcf18fa573acb4709a5f

  • SHA512

    aea1304fc65ae6c060779f2f22dbd5be9f0c338e79c7ebcab763b822f55141a827bd8fdea04faf3128699076e9cb0075a5717f219086ec359b4faa67a9f33e14

  • SSDEEP

    6144:x+86v2VKRnZEvCijwzDv35F5+Djwy/QCn5drokAieiR:x0v6vCij+3yB31x

Malware Config

Extracted

Family

icedid

Campaign

2537954433

C2

scainznorka.com

Targets

    • Target

      avers.db

    • Size

      532KB

    • MD5

      8201f1bfd204972dd1c2cb989a7c8cdf

    • SHA1

      73ae0872d685685e2395894c743df925dcfd19d6

    • SHA256

      39af395246a555cdca505f3b7358db16b107bd186b9cbcf18fa573acb4709a5f

    • SHA512

      aea1304fc65ae6c060779f2f22dbd5be9f0c338e79c7ebcab763b822f55141a827bd8fdea04faf3128699076e9cb0075a5717f219086ec359b4faa67a9f33e14

    • SSDEEP

      6144:x+86v2VKRnZEvCijwzDv35F5+Djwy/QCn5drokAieiR:x0v6vCij+3yB31x

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix

Tasks