General

  • Target

    file.dll

  • Size

    95KB

  • Sample

    221116-2vx1mahc3x

  • MD5

    c40b908d0723229b8fe209802077bb6c

  • SHA1

    ab78490c6c4c7372ee23cc6ab56aa932b989aa24

  • SHA256

    bec61c5d3e29f907640bc484b0c73faf76e9df9d7e3b4d28449ece5831b62edd

  • SHA512

    f72eb76511412780be901578378bd106c43ace88aa74b321d3b3c66ad24b612b1e08a2363d3ef66665101bfe6496b9df8c077e1987b7ea046f2e31551486cb1a

  • SSDEEP

    1536:jiS5J5mGsuP1BThFbA+d0oKcltodmrb73AYM+OAMNFqVb8ywRywi7sn:ji85fRbA+d0j4tDHwYmNib8ywRHi7sn

Malware Config

Extracted

Family

icedid

Campaign

1626240797

C2

aurasantisflork.com

Targets

    • Target

      file.dll

    • Size

      95KB

    • MD5

      c40b908d0723229b8fe209802077bb6c

    • SHA1

      ab78490c6c4c7372ee23cc6ab56aa932b989aa24

    • SHA256

      bec61c5d3e29f907640bc484b0c73faf76e9df9d7e3b4d28449ece5831b62edd

    • SHA512

      f72eb76511412780be901578378bd106c43ace88aa74b321d3b3c66ad24b612b1e08a2363d3ef66665101bfe6496b9df8c077e1987b7ea046f2e31551486cb1a

    • SSDEEP

      1536:jiS5J5mGsuP1BThFbA+d0oKcltodmrb73AYM+OAMNFqVb8ywRywi7sn:ji85fRbA+d0j4tDHwYmNib8ywRHi7sn

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix

Tasks