General

  • Target

    2ja416p1.dll.exe

  • Size

    91KB

  • Sample

    221111-grfxqabfan

  • MD5

    7037e6f38bd7d97f6b291c2b1d63f4b8

  • SHA1

    abb104e204cb5e38e4f913af03a8b79335c3e7af

  • SHA256

    4d4375aa3867b395247df686e0aa83c59a6d109e56754450e87455fe510deb66

  • SHA512

    27b96726e9e6be908aacffc924ec314ecc0b4fd2c3ed98d8da1e5669b8acaad6c62ebd643e01855e7e54c55c8e919d40545c59a54fc6cd1e51349c27867e1814

  • SSDEEP

    1536:4kmo3Uy3PEXX01u4APFIzO55RGh8WKAYNvWEAueFPCV70W0GIQqcch9ypqlh/vYL:p3UyfEXXTKqMh8sYNvWEAnQ90Sqccjyx

Malware Config

Extracted

Family

icedid

Campaign

1292139634

C2

oiurkastarting.com

Targets

    • Target

      2ja416p1.dll.exe

    • Size

      91KB

    • MD5

      7037e6f38bd7d97f6b291c2b1d63f4b8

    • SHA1

      abb104e204cb5e38e4f913af03a8b79335c3e7af

    • SHA256

      4d4375aa3867b395247df686e0aa83c59a6d109e56754450e87455fe510deb66

    • SHA512

      27b96726e9e6be908aacffc924ec314ecc0b4fd2c3ed98d8da1e5669b8acaad6c62ebd643e01855e7e54c55c8e919d40545c59a54fc6cd1e51349c27867e1814

    • SSDEEP

      1536:4kmo3Uy3PEXX01u4APFIzO55RGh8WKAYNvWEAueFPCV70W0GIQqcch9ypqlh/vYL:p3UyfEXXTKqMh8sYNvWEAnQ90Sqccjyx

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix

Tasks