General

  • Target

    271b401b360e5d437fbd0279e8d011368f3a647f5c2bd3e611548542ce5278cc.zip

  • Size

    141KB

  • Sample

    220927-ycl9mafdfj

  • MD5

    34f63efb64ad60b670441fa906ed2389

  • SHA1

    dcee34d18c71c464f84c6e4cf9a46f3970f45a97

  • SHA256

    9439c9ee5019f477d4846b1419b677896310a5a5f60dc84f2c6d9e995d81d9a9

  • SHA512

    3872063f75583821f62f84c2c93ab447e051c327e9bb1dbcae22f31459c86ec9650ef690b1855adef2b1293254e5799682f803263973c62591edcecaae0f1355

  • SSDEEP

    3072:/9yf01dzivBUVPc6eFUSFqLNlkWNpcvl7dNG17y5h:/9mudzivIZEU0ENDavl7PG1OL

Malware Config

Extracted

Family

icedid

Campaign

3228182693

C2

tezycronam.com

Targets

    • Target

      mark.db

    • Size

      476KB

    • MD5

      351873fcf8b0944d7b5c84d49d1fbbc4

    • SHA1

      a6574f129f4478aea684a63fb63d710e0f24afa3

    • SHA256

      271b401b360e5d437fbd0279e8d011368f3a647f5c2bd3e611548542ce5278cc

    • SHA512

      a1b9f3efa45ba5c68fc5a3c13369f252831a7fb8d5db57df3c8dde47b6200f7a622ee25001e782e7757242315b6c5da791d45934cb2a0e4e8c6efcdeb9d33e5c

    • SSDEEP

      6144:Dm9LrTQ6q1i6qHQeQ34WxpJi8TnFoevqqF8Ypsc2KPE9:eLrHq1i6qQ4WxpAOnFoevqy8YpbE9

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix

Tasks