General

  • Target

    aebf64159ae48037d8a2760a291df93f

  • Size

    95KB

  • Sample

    240229-rw458acd77

  • MD5

    aebf64159ae48037d8a2760a291df93f

  • SHA1

    4f40b00f26420bbcb6b6966b257db00c7e29d4ad

  • SHA256

    a0a2c1bcf4275e486c1c385eda0ecf58718f52061d29bea7192f0a2af3005709

  • SHA512

    0a5ba4006d6e94f1663ee3dbf66b2cdbfbe85973b53ef4de88bed08b49d9da7eebf47eedb0438b8de47628f0ca05eacd6e5635cb4838a314cc4b8c39b73bb63b

  • SSDEEP

    1536:kgxBlDdE8gaVncuTrPzZSj+/4+Ff2f7gR8sOBUep2w7T1YJGvj2u8MQN6YZgy57H:U8Z1j47ga95f/L/8iYWFJW9

Malware Config

Extracted

Family

icedid

Targets

    • Target

      e298ef044baada7fadb47e9b722197896b4dafa18313de9a40bf96755148e614

    • Size

      168KB

    • MD5

      d5ce57c496199a940b18facab5968b72

    • SHA1

      e759b9c9ec46e65e5c4790d45f833da0ee327b64

    • SHA256

      e298ef044baada7fadb47e9b722197896b4dafa18313de9a40bf96755148e614

    • SHA512

      fca0e9da6752257d7de464f580a5b59690f6f66dd0f17cc1f66ab926577d2cc0e61e80a5c163dcc652069fea2bc1f7c4fe40655cc5f442d58f3125dee77b7466

    • SSDEEP

      3072:F+ymPQ38mtBMzgxpvvdoZpSjXfW8Pzkfg:FcQ38AxpOZEzO8bj

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID Second Stage Loader

MITRE ATT&CK Matrix

Tasks