General

  • Target

    wifely.temp

  • Size

    49KB

  • Sample

    221118-w6jpgsbf63

  • MD5

    f232967433d5490c9409a4b6a7568367

  • SHA1

    fd5760d359e597daf91cdfea7415a870547f7ad2

  • SHA256

    2ef312bd91e56ac551bc223b1c8a1a2c170bdd402a0f4845862ad497ade8c84e

  • SHA512

    50a6532d06e2e5154d2c85a29044db875027d9b9a7e38647727d3902744e9c0cbe3da2605c9c17af11a7485dbff5b5cadfb984e89db622af2435a53d0c2068bc

  • SSDEEP

    768:ki9IlCuxlaboLzk8FQm5OzR4HziHF47DPh/x8bQZ2w0Nt8ASwn5:kiWl3LzPIdEzqFI7v8sZE+ASwn5

Malware Config

Extracted

Family

icedid

Campaign

3822462527

C2

sciiultaelinoza.com

Targets

    • Target

      wifely.temp

    • Size

      49KB

    • MD5

      f232967433d5490c9409a4b6a7568367

    • SHA1

      fd5760d359e597daf91cdfea7415a870547f7ad2

    • SHA256

      2ef312bd91e56ac551bc223b1c8a1a2c170bdd402a0f4845862ad497ade8c84e

    • SHA512

      50a6532d06e2e5154d2c85a29044db875027d9b9a7e38647727d3902744e9c0cbe3da2605c9c17af11a7485dbff5b5cadfb984e89db622af2435a53d0c2068bc

    • SSDEEP

      768:ki9IlCuxlaboLzk8FQm5OzR4HziHF47DPh/x8bQZ2w0Nt8ASwn5:kiWl3LzPIdEzqFI7v8sZE+ASwn5

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix

Tasks