General

  • Target

    prob_3

  • Size

    185KB

  • Sample

    230125-lcy7zafe87

  • MD5

    87dc37e0edb39c077c4d4d8f1451402c

  • SHA1

    4a45780d3872ae1462a85e5f711f753260f8d7df

  • SHA256

    b21f9afc6443548427bf83b5f93e7a54ac3af306d9d71b8348a6f146b2819457

  • SHA512

    0c315c056ac2aec977cc80c7c53cf3a118ee86ced8203437eddff6a8e653256153e8469055b7efd40796c1e1695e346b6ca65d90d70fee248e4dd8166909389e

  • SSDEEP

    3072:uXpAQlUasEbieV/gltztsCvq2mv0u+EKX9E0JfHIQL:uXtUPvtsyqfCJJH7

Malware Config

Extracted

Family

icedid

Botnet

2634746917

C2

june85.cyou

golddisco.top

Attributes
  • auth_var

    4

  • url_path

    /audio/

Extracted

Family

icedid

Targets

    • Target

      prob_3

    • Size

      185KB

    • MD5

      87dc37e0edb39c077c4d4d8f1451402c

    • SHA1

      4a45780d3872ae1462a85e5f711f753260f8d7df

    • SHA256

      b21f9afc6443548427bf83b5f93e7a54ac3af306d9d71b8348a6f146b2819457

    • SHA512

      0c315c056ac2aec977cc80c7c53cf3a118ee86ced8203437eddff6a8e653256153e8469055b7efd40796c1e1695e346b6ca65d90d70fee248e4dd8166909389e

    • SSDEEP

      3072:uXpAQlUasEbieV/gltztsCvq2mv0u+EKX9E0JfHIQL:uXtUPvtsyqfCJJH7

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID Second Stage Loader

MITRE ATT&CK Matrix

Tasks