General

  • Target

    1648556.bin

  • Size

    208KB

  • Sample

    240130-tqh2xaheg5

  • MD5

    5b37fba9803604b8a79df4817d569456

  • SHA1

    6bf01466ac467fabb8ef8b3575373d4d82012b6c

  • SHA256

    d5ffa565905837a1b14d5a00c44ef14bb429a907f7323f140583b69a69e5cdbe

  • SHA512

    c7ca4906f72ca0bbc9314c7eecc82ce355d94fd503ac94750a81cfb4fb2bb9c810753717af569bcad96633d8bd938919c1f0952bd55173cf6b95aa1d1cbc33f2

  • SSDEEP

    3072:WMTNt2JlRRZuH5a3YTy371U4isTFXFG83+xdeILvqo+:zNt0ZuH5YYTy3RMcVkbbCN

Malware Config

Extracted

Family

icedid

Targets

    • Target

      1648556.bin

    • Size

      208KB

    • MD5

      5b37fba9803604b8a79df4817d569456

    • SHA1

      6bf01466ac467fabb8ef8b3575373d4d82012b6c

    • SHA256

      d5ffa565905837a1b14d5a00c44ef14bb429a907f7323f140583b69a69e5cdbe

    • SHA512

      c7ca4906f72ca0bbc9314c7eecc82ce355d94fd503ac94750a81cfb4fb2bb9c810753717af569bcad96633d8bd938919c1f0952bd55173cf6b95aa1d1cbc33f2

    • SSDEEP

      3072:WMTNt2JlRRZuH5a3YTy371U4isTFXFG83+xdeILvqo+:zNt0ZuH5YYTy3RMcVkbbCN

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID Second Stage Loader

    • Unpacked IcedID was Detected

      This rule detects samples from the IcedID family unpacked in memory, identifying code reuse of key functions.

MITRE ATT&CK Matrix

Tasks