General

  • Target

    3a585be7037b0dd24dbc719e8a05d1a1502108bb6e0fea62d6b90980be75a7d9.zip

  • Size

    222KB

  • Sample

    230202-jx3d1sfe64

  • MD5

    72a95ef1d2baf2b48358aa21cafd557d

  • SHA1

    6e7c9909d51500fd73952f34b37fabe18b59a808

  • SHA256

    977ddadd00dfc62105fb1bfa45ccbd8dac782a341fcd9b082988ce789c9dfac3

  • SHA512

    5d31997884618049ec107bf985b1dedd0d53d39fe76b39732e067802611cd3fd3fc46fbf0baf25d267e0397eff74e06ab3856a2f1994768fafcf9396c9d9a132

  • SSDEEP

    6144:TDSRTJ52q58LnyilAoPIQq35zA7pDH7n8nzJ41mtJfBOSHL:iRTJxuLllJaJE7pv8nzJ4QtJfBVr

Malware Config

Extracted

Family

icedid

Campaign

133894510

C2

restorahlith.com

Targets

    • Target

      3a585be7037b0dd24dbc719e8a05d1a1502108bb6e0fea62d6b90980be75a7d9.exe

    • Size

      649KB

    • MD5

      36b89900c9300156d4ba6e19742c7498

    • SHA1

      2c889cf43e2b0e162ddb2ac9567b1ee3507f9f88

    • SHA256

      3a585be7037b0dd24dbc719e8a05d1a1502108bb6e0fea62d6b90980be75a7d9

    • SHA512

      413e556a825d2342d4b0a364116c43953f1aa362193e2c8b98235856be26ccb9763abd89112b38d39fbc1f4020fdd2f95a581b4e26693f1cf245428688e8d2bb

    • SSDEEP

      12288:o41EwgLoMgUh2W2kRSkWzgVz6iW8fPmniuwiC:XEwgL/gUEW2kRSkWzgVz6l0+iuwF

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

MITRE ATT&CK Matrix

Tasks