General

  • Target

    problem_2

  • Size

    178KB

  • Sample

    230125-lc3kdsfe88

  • MD5

    0defacf9edf30d2f5abe16fef26d92ac

  • SHA1

    1d0e229fe28c42cf25f4f688bad9925864a08193

  • SHA256

    800e53e7acb97419f42d8c82e9c34a2810ebbbe98058f580719ab83e70be435c

  • SHA512

    5f98b4fa840da710af2581fc91999596cfe10d0fc3eb25922cd5d13669abeb070169e95fe9690010d085da34f09fe0c873266b948eab3d1dada3a47571b61e6a

  • SSDEEP

    3072:dRNOtBIEa2A/k3xTCD4xugYOpddiT+t1xLyRlu94OApLnjWEV2rdSu:rNQIEaH/W80xugYOpHiT+t10Rlu943kd

Malware Config

Extracted

Family

icedid

C2

qapoloki.cyou

Targets

    • Target

      problem_2

    • Size

      178KB

    • MD5

      0defacf9edf30d2f5abe16fef26d92ac

    • SHA1

      1d0e229fe28c42cf25f4f688bad9925864a08193

    • SHA256

      800e53e7acb97419f42d8c82e9c34a2810ebbbe98058f580719ab83e70be435c

    • SHA512

      5f98b4fa840da710af2581fc91999596cfe10d0fc3eb25922cd5d13669abeb070169e95fe9690010d085da34f09fe0c873266b948eab3d1dada3a47571b61e6a

    • SSDEEP

      3072:dRNOtBIEa2A/k3xTCD4xugYOpddiT+t1xLyRlu94OApLnjWEV2rdSu:rNQIEaH/W80xugYOpHiT+t10Rlu943kd

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

    • Blocklisted process makes network request

MITRE ATT&CK Matrix

Tasks