General

  • Target

    a783986cbe332a8ae35497c0b93996ddb0dcbe58539fe58555da72238a87f42e.dll

  • Size

    13KB

  • Sample

    230113-rd28xahd87

  • MD5

    0fed3373c8aa63c639aad95735f94e56

  • SHA1

    10234f1b1373272f25477b61b23206251a0ebad5

  • SHA256

    a783986cbe332a8ae35497c0b93996ddb0dcbe58539fe58555da72238a87f42e

  • SHA512

    a1ac04c7b32add013f5b5eb54a319b0153bd582350d8b1094ab3f5d436b7134b14b8bff039e99256077ff7d82d980f6b4c8ff96ce072cef7f06ff2fa076c114a

  • SSDEEP

    192:6c+nM5KC/zxayGc3gzq7YjDaqzJCueT+RfbZne9s6PLlGtMP0tkYGijYn:J5Jxayczq7Yjt9lfle9s6PLaQ6kYGi8

Malware Config

Extracted

Family

icedid

Campaign

1387823457

C2

allertmnemonkik.com

Extracted

Family

icedid

Campaign

1387823457

Targets

    • Target

      a783986cbe332a8ae35497c0b93996ddb0dcbe58539fe58555da72238a87f42e.dll

    • Size

      13KB

    • MD5

      0fed3373c8aa63c639aad95735f94e56

    • SHA1

      10234f1b1373272f25477b61b23206251a0ebad5

    • SHA256

      a783986cbe332a8ae35497c0b93996ddb0dcbe58539fe58555da72238a87f42e

    • SHA512

      a1ac04c7b32add013f5b5eb54a319b0153bd582350d8b1094ab3f5d436b7134b14b8bff039e99256077ff7d82d980f6b4c8ff96ce072cef7f06ff2fa076c114a

    • SSDEEP

      192:6c+nM5KC/zxayGc3gzq7YjDaqzJCueT+RfbZne9s6PLlGtMP0tkYGijYn:J5Jxayczq7Yjt9lfle9s6PLaQ6kYGi8

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix

Tasks