General

  • Target

    9590279a6b04919ff51d07570f63fb5120f08aa8

  • Size

    352KB

  • Sample

    221007-ajl1fabdcl

  • MD5

    21152fd4b3823f4cf6dcd601806412f1

  • SHA1

    9590279a6b04919ff51d07570f63fb5120f08aa8

  • SHA256

    21e4f7887b8e7317f07f73c14f03b3d5bfc2b457ac39f80b2ec58b65cae476f0

  • SHA512

    2b312be1d4ab856735df0a0b57901c960ca068e2308cffed4e83dc0bcbd03c4804d342de003695c78831a021400fd6a14e3792feccb18555ff0ca3b2d0219cff

  • SSDEEP

    6144:gYCYa6MfAcSlE+S0fzAMJfWpKd5WhAl7CJDZ/PeHbUhHTmGPqG7s6FmlEHKiTd:XCwMfjSlE+A4eguRJDtPZIG46FkEH9

Malware Config

Extracted

Family

icedid

Campaign

3570055661

C2

alexbionka.com

Targets

    • Target

      9590279a6b04919ff51d07570f63fb5120f08aa8

    • Size

      352KB

    • MD5

      21152fd4b3823f4cf6dcd601806412f1

    • SHA1

      9590279a6b04919ff51d07570f63fb5120f08aa8

    • SHA256

      21e4f7887b8e7317f07f73c14f03b3d5bfc2b457ac39f80b2ec58b65cae476f0

    • SHA512

      2b312be1d4ab856735df0a0b57901c960ca068e2308cffed4e83dc0bcbd03c4804d342de003695c78831a021400fd6a14e3792feccb18555ff0ca3b2d0219cff

    • SSDEEP

      6144:gYCYa6MfAcSlE+S0fzAMJfWpKd5WhAl7CJDZ/PeHbUhHTmGPqG7s6FmlEHKiTd:XCwMfjSlE+A4eguRJDtPZIG46FkEH9

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix

Tasks