General

  • Target

    d48ab15e05d1f0f9efb7ee2a73625add

  • Size

    54KB

  • Sample

    240318-z2vsqsab75

  • MD5

    d48ab15e05d1f0f9efb7ee2a73625add

  • SHA1

    82bab7033fcda71d9e21c18dd7eda841f6732ce9

  • SHA256

    0cf89c759064b298ec0a1d9fda5c651b58bc7f89665eb4dea0778c2611e110d1

  • SHA512

    70ba63601a36635a288cf23971d02089688ae46d9bde79bb865ade1477f3d94a113a573d3f9da1d396ca9eda798578f626fa9db4e72227084abcec9d5443e7b9

  • SSDEEP

    768:6CRq89CmBb+/svFkbYWlVtCKsw2h+Sg6KXMXcDnTaWiSyMDWZ+BH+PVnVUKUmN:6wdf+UKbDPt/eW6KXd7mEyMDssePVVrN

Malware Config

Extracted

Family

icedid

Targets

    • Target

      98d53f27e6d39ba36df22aa2bda5e719e92264f4a188e143fee5bbbaef636a32

    • Size

      108KB

    • MD5

      69ea2a59a9b647a323fda98fdce6f977

    • SHA1

      dadaa5977b73957bc6046a7caba9d06ebf55bc75

    • SHA256

      98d53f27e6d39ba36df22aa2bda5e719e92264f4a188e143fee5bbbaef636a32

    • SHA512

      b093ce66a0f7e8d6b0ab8db725de4a80b24090fde30f5747cfebf55870c6913f2831a3ddba0edf86c6fe1826e8d35fffc34466abe135f525aed258b13b649db8

    • SSDEEP

      1536:nrMmn5iWp5sYUmPqzksTqB/mLfFTtQ+zHB9MU:nA25iYe2aYKfFi+zHvMU

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID Second Stage Loader

MITRE ATT&CK Matrix

Tasks