General

  • Target

    thank_white.png

  • Size

    95KB

  • Sample

    221118-3l8lfada77

  • MD5

    3644e2ee982be5fec5bc0da5f15571d4

  • SHA1

    c4ec8722d534f0473926b60ee324c9ec10b05ff8

  • SHA256

    dc67e796367c987a6e3c14315fefa52405eacb276ce3527cddb396bac4343e46

  • SHA512

    d5a87d150230322e4774ecfdf9cd4b9a241838d519e78e0fcf4fdabd76effab860f584eccd7113f80aad7c1258f58c2034de76dc5fc9c7399feaa6ceff59abdb

  • SSDEEP

    1536:jy5k7TI5OMPHJ0uII+bCHxMBUZfbKIW4o5mEC6iExd3I+/7CDwrwzLNnIdJDbyHs:t7TI0MBIJbCHxMMu45ECXEzYfLtM

Malware Config

Extracted

Family

icedid

Campaign

1626240797

C2

aurasantisflork.com

Targets

    • Target

      thank_white.png

    • Size

      95KB

    • MD5

      3644e2ee982be5fec5bc0da5f15571d4

    • SHA1

      c4ec8722d534f0473926b60ee324c9ec10b05ff8

    • SHA256

      dc67e796367c987a6e3c14315fefa52405eacb276ce3527cddb396bac4343e46

    • SHA512

      d5a87d150230322e4774ecfdf9cd4b9a241838d519e78e0fcf4fdabd76effab860f584eccd7113f80aad7c1258f58c2034de76dc5fc9c7399feaa6ceff59abdb

    • SSDEEP

      1536:jy5k7TI5OMPHJ0uII+bCHxMBUZfbKIW4o5mEC6iExd3I+/7CDwrwzLNnIdJDbyHs:t7TI0MBIJbCHxMMu45ECXEzYfLtM

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix

Tasks