General

  • Target

    challenge-files.zip

  • Size

    4.8MB

  • Sample

    221114-3st2maeb68

  • MD5

    4edf33b3a4dd1c1c005aefeaa29c7f1d

  • SHA1

    e4d4bb8c8dcf357b068019660fdc72e65f577857

  • SHA256

    d312c079c51f2bf011902df86e1ca4cac84eb7c74ff104fa48a505caa88ef2fe

  • SHA512

    b647d071e71ece4a4d5d4601f28cbcab9f12a85014f1d06cc80ed65f35c7d3f81fc0b27cfd0855b456194f50e7f5dd2ce9588077735c2ec7f43f4a1e38ee2803

  • SSDEEP

    98304:DfFixex8es3YZIbSNMDHMDhODrxaQe8vNzLB/RensEGdCW/1BTK4EBzaQyLzZ:sAx8eOHawsDhk0QlvNLB/0nsEGdCWNIu

Malware Config

Extracted

Family

icedid

Campaign

548569227

C2

supplementik.top

Targets

    • Target

      challenge-files/challenge-files/collectionBoxConst.jpg

    • Size

      538KB

    • MD5

      65641f6498b6f94b0bdeb886e448d460

    • SHA1

      b17591ec88cccf664f911f6e8a235e082e6bd892

    • SHA256

      51658887e46c88ed6d5861861a55c989d256a7962fb848fe833096ed6b049441

    • SHA512

      3896899d6c80de9dd383d15dde246a4478e94b72b7c780da9a3b4e2068aac85929b8665fbe8055ca9d1586c93fc1a7cc4dbdacf47cb3b3079d1830853ba9041c

    • SSDEEP

      6144:8DLTDShETtXZAngMPZQn41hGEn1qaM8nOD4E8ONTxyohggJXZrO:8PTDS6TvfImgBe8nO4oZG

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix

Tasks