General

  • Target

    240o276e.dll

  • Size

    91KB

  • Sample

    221111-gswpkahff5

  • MD5

    da71193e5398f55f46b55482429cb2fb

  • SHA1

    28a4c08e7ed06d8362fc648bb1f68e17f66c6c43

  • SHA256

    3ffbbd3fb826dd62e21cd953ad50cbfa325d127c0cd2df0683c355006a92f47c

  • SHA512

    d07829b7fb092d5227776f1a4ed99da69ee386612805f020c711ecd65325787833ff907ad8a61c367c14e2e299b6557b2b68c518a7301fa751c5035eac77fdb7

  • SSDEEP

    1536:Lkmo3Uy3PEXX01u4APFIzO55RGh8WKAYNvWEAueFPCV70W0GIQqcch9ypqlh/vYL:U3UyfEXXTKqMh8sYNvWEAnQ90Sqccjyx

Malware Config

Extracted

Family

icedid

Campaign

1292139634

C2

oiurkastarting.com

Targets

    • Target

      240o276e.dll

    • Size

      91KB

    • MD5

      da71193e5398f55f46b55482429cb2fb

    • SHA1

      28a4c08e7ed06d8362fc648bb1f68e17f66c6c43

    • SHA256

      3ffbbd3fb826dd62e21cd953ad50cbfa325d127c0cd2df0683c355006a92f47c

    • SHA512

      d07829b7fb092d5227776f1a4ed99da69ee386612805f020c711ecd65325787833ff907ad8a61c367c14e2e299b6557b2b68c518a7301fa751c5035eac77fdb7

    • SSDEEP

      1536:Lkmo3Uy3PEXX01u4APFIzO55RGh8WKAYNvWEAueFPCV70W0GIQqcch9ypqlh/vYL:U3UyfEXXTKqMh8sYNvWEAnQ90Sqccjyx

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix

Tasks