General

  • Target

    e32ec4435527d0e1e49205eb9d5d3e60N.exe

  • Size

    180KB

  • Sample

    240906-3ej99sshmn

  • MD5

    e32ec4435527d0e1e49205eb9d5d3e60

  • SHA1

    4d2f4108a00d7349264c0fdae162bf39242e3615

  • SHA256

    bc392d0862c973a75ed900aab55c869242984c9ccee448c9053834b7577e9a05

  • SHA512

    d6e7377d969f7a2b44bb7939784f00e14966713e3b3bd61c20a3a2e1871ae9786056f684a1b224443159456fbfa8a4b338984a7180feac9ba50965c48af67e1e

  • SSDEEP

    3072:aWDZ3U6U9IXYZM+4P2vOP5w+hrEI0TmCsb:aWDZ3OCZMOprWQ

Malware Config

Extracted

Family

icedid

C2

loadlisboa.casa

Targets

    • Target

      e32ec4435527d0e1e49205eb9d5d3e60N.exe

    • Size

      180KB

    • MD5

      e32ec4435527d0e1e49205eb9d5d3e60

    • SHA1

      4d2f4108a00d7349264c0fdae162bf39242e3615

    • SHA256

      bc392d0862c973a75ed900aab55c869242984c9ccee448c9053834b7577e9a05

    • SHA512

      d6e7377d969f7a2b44bb7939784f00e14966713e3b3bd61c20a3a2e1871ae9786056f684a1b224443159456fbfa8a4b338984a7180feac9ba50965c48af67e1e

    • SSDEEP

      3072:aWDZ3U6U9IXYZM+4P2vOP5w+hrEI0TmCsb:aWDZ3OCZMOprWQ

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

    • Blocklisted process makes network request

MITRE ATT&CK Enterprise v15

Tasks