General

  • Target

    d2d2a0e222cdc86c64a9a761c2fed580N

  • Size

    638KB

  • Sample

    240913-x25a3avbmg

  • MD5

    d2d2a0e222cdc86c64a9a761c2fed580

  • SHA1

    1e8907cce7a08fe3a7105515cc12160b4084fba2

  • SHA256

    f69527775e7d7c4d50efbe080f6ccf0aba0fba96ddbe96403f8b00fe2a1ee11c

  • SHA512

    9d23a9d18b2dcc465f734756ce35d6046cfa3e85eca54a59d9d028e81ca48e65127587d90f86cfdff1410a3263ff804f12c46f013484fc02e8b3f09152ffd053

  • SSDEEP

    6144:1j6rqZeZ6ryI8yG4B0ZwNJ6eXSYmQE/JNpARuEk7OeZS22aQZnLd8ZenJ:1+qZeZwyILgZi6YZmX/JHzZpQZf

Malware Config

Extracted

Family

icedid

Extracted

Family

icedid

Botnet

146076989

C2

kostacardsplayer.pro

kostafootball.info

countrylandlords.info

landiscloudlord.red

Attributes
  • auth_var

    1

  • url_path

    /index.php

Targets

    • Target

      d2d2a0e222cdc86c64a9a761c2fed580N

    • Size

      638KB

    • MD5

      d2d2a0e222cdc86c64a9a761c2fed580

    • SHA1

      1e8907cce7a08fe3a7105515cc12160b4084fba2

    • SHA256

      f69527775e7d7c4d50efbe080f6ccf0aba0fba96ddbe96403f8b00fe2a1ee11c

    • SHA512

      9d23a9d18b2dcc465f734756ce35d6046cfa3e85eca54a59d9d028e81ca48e65127587d90f86cfdff1410a3263ff804f12c46f013484fc02e8b3f09152ffd053

    • SSDEEP

      6144:1j6rqZeZ6ryI8yG4B0ZwNJ6eXSYmQE/JNpARuEk7OeZS22aQZnLd8ZenJ:1+qZeZwyILgZi6YZmX/JHzZpQZf

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID Second Stage Loader

MITRE ATT&CK Enterprise v15

Tasks