General

  • Target

    music_leg.png

  • Size

    95KB

  • Sample

    221117-lfzynsea84

  • MD5

    d71cfe0c6d883c021098f3ab01f7fe08

  • SHA1

    4cca434a28e307a7fff8e01a7fb1c33a661551ab

  • SHA256

    5e910d228d4790cdc41ab0aaada355f9cee36b0d585be08fb359c7d2ea85b3b8

  • SHA512

    ed01319a09910d9ca0df3efe987411ddb13800ea178806e85ff62976035a7b6b0f1c8bdc4e76b2943d604a27aff385603e3dd9d179ad2ad4787c29e451c815ab

  • SSDEEP

    1536:Qy5k7TI5OMPHJ0u2+bCHxMBUZfbKIW4o5mEC6iExd3I+/7CDwrwzLNnIdJDbyHs:m7TI0MBvbCHxMMu45ECXEzYfLtM

Malware Config

Extracted

Family

icedid

Campaign

1626240797

C2

aurasantisflork.com

Targets

    • Target

      music_leg.png

    • Size

      95KB

    • MD5

      d71cfe0c6d883c021098f3ab01f7fe08

    • SHA1

      4cca434a28e307a7fff8e01a7fb1c33a661551ab

    • SHA256

      5e910d228d4790cdc41ab0aaada355f9cee36b0d585be08fb359c7d2ea85b3b8

    • SHA512

      ed01319a09910d9ca0df3efe987411ddb13800ea178806e85ff62976035a7b6b0f1c8bdc4e76b2943d604a27aff385603e3dd9d179ad2ad4787c29e451c815ab

    • SSDEEP

      1536:Qy5k7TI5OMPHJ0u2+bCHxMBUZfbKIW4o5mEC6iExd3I+/7CDwrwzLNnIdJDbyHs:m7TI0MBvbCHxMMu45ECXEzYfLtM

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix

Tasks