General

  • Target

    bd13e9533f1d7158b6f74e2d9b49d600.dll.exe

  • Size

    452KB

  • Sample

    220928-l984fafeg5

  • MD5

    bd13e9533f1d7158b6f74e2d9b49d600

  • SHA1

    aa7b89170cde902dd63611b321a3a26d42ce8ccd

  • SHA256

    4e0f7777fd3ba58bb20f7ceaebaff50b6dcc3191cf27519d83b5ad3db30b8f5e

  • SHA512

    1c3de914f540e0cb0d1df179800328ed63467c1048eef41fc34452ee6e5b19134bfd1733be27b3ce9c93d96c716e72a383a44aed31d5129829e90f3011fe753b

  • SSDEEP

    3072:JOJOuzQiAIOvJ+1rzyp5cq1LGKFKHrt9F5p3BZiZqBAJLMok3n+CBrMrRZm1xAy8:YJOuZrzyp5V1LGKiBBMSkLTc+yyZmAd

Malware Config

Extracted

Family

icedid

Campaign

2349072319

C2

sebdgoldingor.com

Targets

    • Target

      bd13e9533f1d7158b6f74e2d9b49d600.dll.exe

    • Size

      452KB

    • MD5

      bd13e9533f1d7158b6f74e2d9b49d600

    • SHA1

      aa7b89170cde902dd63611b321a3a26d42ce8ccd

    • SHA256

      4e0f7777fd3ba58bb20f7ceaebaff50b6dcc3191cf27519d83b5ad3db30b8f5e

    • SHA512

      1c3de914f540e0cb0d1df179800328ed63467c1048eef41fc34452ee6e5b19134bfd1733be27b3ce9c93d96c716e72a383a44aed31d5129829e90f3011fe753b

    • SSDEEP

      3072:JOJOuzQiAIOvJ+1rzyp5cq1LGKFKHrt9F5p3BZiZqBAJLMok3n+CBrMrRZm1xAy8:YJOuZrzyp5V1LGKiBBMSkLTc+yyZmAd

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix

Tasks