General

  • Target

    605dec0c4a093fb3d483b1a64095095f.dll.exe

  • Size

    452KB

  • Sample

    220928-jmjh6agdhn

  • MD5

    605dec0c4a093fb3d483b1a64095095f

  • SHA1

    ba523a087176ffd8180aafe571b8d4a921ca72c4

  • SHA256

    f5c8432582725df64137750ec749860928341bd2cdc103574e0fceae6c9c2173

  • SHA512

    7059918db788515bf7b5121cfe28f1fc7cc04500977b12ff21620f4709f8007648366fb28f6d211dde01712e7ff9f556201da5dbccb314ad76b84e6e7a60e737

  • SSDEEP

    3072:tRJOuzQiAIOvJ+1rzyp5cq1LGKFKHrt9F5p3BZiZqBAJLMok3n+CBrMrRZm1xAyH:jJOuZrzyp5V1LGKiBBMSkLTc+yyZmAy

Malware Config

Extracted

Family

icedid

Campaign

2349072319

C2

sebdgoldingor.com

Targets

    • Target

      605dec0c4a093fb3d483b1a64095095f.dll.exe

    • Size

      452KB

    • MD5

      605dec0c4a093fb3d483b1a64095095f

    • SHA1

      ba523a087176ffd8180aafe571b8d4a921ca72c4

    • SHA256

      f5c8432582725df64137750ec749860928341bd2cdc103574e0fceae6c9c2173

    • SHA512

      7059918db788515bf7b5121cfe28f1fc7cc04500977b12ff21620f4709f8007648366fb28f6d211dde01712e7ff9f556201da5dbccb314ad76b84e6e7a60e737

    • SSDEEP

      3072:tRJOuzQiAIOvJ+1rzyp5cq1LGKFKHrt9F5p3BZiZqBAJLMok3n+CBrMrRZm1xAyH:jJOuZrzyp5V1LGKiBBMSkLTc+yyZmAy

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix

Tasks