General

  • Target

    loader_dll_64_3#003.dll93.dll

  • Size

    60KB

  • Sample

    221123-z6vzashf6v

  • MD5

    13ed2648637e6418a64f68bfcaa36bf7

  • SHA1

    dbb227ba78340c2a1480a8cf869847465d6ee7cd

  • SHA256

    a63eca77d6250ef07cb026e5d243e4f48fc02f386bf92f617da4f63520b30145

  • SHA512

    eb35f7fb298824ead4a2f7b46439b8debb1422ff21ec34b8501b61459f824d248a715d271cf120b6f0057455c89278f42d6cd407e4ac3e3d8f24b953a22f09d6

  • SSDEEP

    768:OTrPopeDou/fSyFvJ+NFL5h18gwxWjDv2HHr6jMxfqQXIAImPiurfrXzueM:OT+hAxKX18Xg2nr6jEfqQXIynfrXzzM

Malware Config

Extracted

Family

icedid

Campaign

1575907940

C2

autovropsanti.com

Targets

    • Target

      loader_dll_64_3#003.dll93.dll

    • Size

      60KB

    • MD5

      13ed2648637e6418a64f68bfcaa36bf7

    • SHA1

      dbb227ba78340c2a1480a8cf869847465d6ee7cd

    • SHA256

      a63eca77d6250ef07cb026e5d243e4f48fc02f386bf92f617da4f63520b30145

    • SHA512

      eb35f7fb298824ead4a2f7b46439b8debb1422ff21ec34b8501b61459f824d248a715d271cf120b6f0057455c89278f42d6cd407e4ac3e3d8f24b953a22f09d6

    • SSDEEP

      768:OTrPopeDou/fSyFvJ+NFL5h18gwxWjDv2HHr6jMxfqQXIAImPiurfrXzueM:OT+hAxKX18Xg2nr6jEfqQXIynfrXzzM

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix

Tasks