General

  • Target

    Malicious_0974e0d69427bc3d87061bcd0546e31f1e6fc0e71160e0fa90be2b3b9aa59784.exe

  • Size

    89KB

  • Sample

    230702-x1yf5aed51

  • MD5

    4faa77e841db9c1270ea875b375191a1

  • SHA1

    d010e79281255a3cd58bfa75899fd87c003d7413

  • SHA256

    0974e0d69427bc3d87061bcd0546e31f1e6fc0e71160e0fa90be2b3b9aa59784

  • SHA512

    6ddf6a2a6492fd909639d73972f20c87ad63009bb26c8359c0bde4af2c327cab3bd86650ffe41cfd88897a90f5c7f9803d3e8f28c4e757302779772b2df8d237

  • SSDEEP

    768:RHppffnqCuZgKEq2OqmBhw9+eyA/Dj74zZ/mgxH7Wgagg1nXFJBMq/umJUZp:NDqvHEbsBneyAbniZPWznfBL/nM

Malware Config

Extracted

Family

icedid

Campaign

3717128962

C2

usaaforced.fun

Targets

    • Target

      Malicious_0974e0d69427bc3d87061bcd0546e31f1e6fc0e71160e0fa90be2b3b9aa59784.exe

    • Size

      89KB

    • MD5

      4faa77e841db9c1270ea875b375191a1

    • SHA1

      d010e79281255a3cd58bfa75899fd87c003d7413

    • SHA256

      0974e0d69427bc3d87061bcd0546e31f1e6fc0e71160e0fa90be2b3b9aa59784

    • SHA512

      6ddf6a2a6492fd909639d73972f20c87ad63009bb26c8359c0bde4af2c327cab3bd86650ffe41cfd88897a90f5c7f9803d3e8f28c4e757302779772b2df8d237

    • SSDEEP

      768:RHppffnqCuZgKEq2OqmBhw9+eyA/Dj74zZ/mgxH7Wgagg1nXFJBMq/umJUZp:NDqvHEbsBneyAbniZPWznfBL/nM

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

    • Drops file in System32 directory

MITRE ATT&CK Matrix

Tasks