General

  • Target

    3b33014b71e0d952678cc0588618834f

  • Size

    120KB

  • Sample

    231231-16rsbafabn

  • MD5

    3b33014b71e0d952678cc0588618834f

  • SHA1

    fa0524d34f9bc9fc351707ce27ed98c9ba40fb06

  • SHA256

    9feb97108351d86097153e964b136c4df995d122165937af29ff53577a7775fd

  • SHA512

    51a392e2899bdb50743fc3d7a2c530ce1b83dfabf2785d2e9150618c12b9fd545762fc778673a19bae3b0e2d966632d6e02159a5409794318e5e85b78d3fe68c

  • SSDEEP

    3072:KkjDFQbx1n5bHxi7CmDLVAn646X0HcY4CMf+EH77TN0:K3HIC9643X+x0

Malware Config

Extracted

Family

icedid

C2

jazzcity.top

Targets

    • Target

      3b33014b71e0d952678cc0588618834f

    • Size

      120KB

    • MD5

      3b33014b71e0d952678cc0588618834f

    • SHA1

      fa0524d34f9bc9fc351707ce27ed98c9ba40fb06

    • SHA256

      9feb97108351d86097153e964b136c4df995d122165937af29ff53577a7775fd

    • SHA512

      51a392e2899bdb50743fc3d7a2c530ce1b83dfabf2785d2e9150618c12b9fd545762fc778673a19bae3b0e2d966632d6e02159a5409794318e5e85b78d3fe68c

    • SSDEEP

      3072:KkjDFQbx1n5bHxi7CmDLVAn646X0HcY4CMf+EH77TN0:K3HIC9643X+x0

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

    • Blocklisted process makes network request

MITRE ATT&CK Matrix

Tasks