General

  • Target

    c7441ea5c8a42ce0a3afa24991c8a7f328434d2eba9c3d2a2fc26543c9288f9a.exe

  • Size

    396KB

  • Sample

    241020-ddaxrsvdme

  • MD5

    ba284cfc6613a94b26e98fbce2ffbcd2

  • SHA1

    86d16b484839e921ddca8fa98a6e917f2e69a2fc

  • SHA256

    c7441ea5c8a42ce0a3afa24991c8a7f328434d2eba9c3d2a2fc26543c9288f9a

  • SHA512

    bcd5c6db1bc7c20cfb6adb576284938f2051ade4792fc33760bcb5ddc68d4294fe58b9b44c23c0732a41fec74b9df9579967a64a47007e12c8a6a266480e8059

  • SSDEEP

    6144:U5n56WmpbhDbl+DjoxoycmxogK0Xn0zznIh0jv6nkZsb66tZ15:0VSo/60PnIhsK66Df

Malware Config

Extracted

Family

icedid

C2

wloppyload.top

Targets

    • Target

      c7441ea5c8a42ce0a3afa24991c8a7f328434d2eba9c3d2a2fc26543c9288f9a.exe

    • Size

      396KB

    • MD5

      ba284cfc6613a94b26e98fbce2ffbcd2

    • SHA1

      86d16b484839e921ddca8fa98a6e917f2e69a2fc

    • SHA256

      c7441ea5c8a42ce0a3afa24991c8a7f328434d2eba9c3d2a2fc26543c9288f9a

    • SHA512

      bcd5c6db1bc7c20cfb6adb576284938f2051ade4792fc33760bcb5ddc68d4294fe58b9b44c23c0732a41fec74b9df9579967a64a47007e12c8a6a266480e8059

    • SSDEEP

      6144:U5n56WmpbhDbl+DjoxoycmxogK0Xn0zznIh0jv6nkZsb66tZ15:0VSo/60PnIhsK66Df

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

MITRE ATT&CK Enterprise v15

Tasks