General

  • Target

    a3fa68045d0106d6db3d43df6b5997d9034f9f7d2a34148187498e4b504ebf58

  • Size

    15KB

  • Sample

    241026-pk65bsthjb

  • MD5

    06cc2fdfd408c15a1e16adfb46e8bb38

  • SHA1

    585cfc19bdb8dfb92407e917615be1ab9dd523e5

  • SHA256

    a3fa68045d0106d6db3d43df6b5997d9034f9f7d2a34148187498e4b504ebf58

  • SHA512

    eb11a4b40eb20610f3296af8c8a7c8af5934e10922146fdc524b8212077025ccd22aa69e16aa38af56a86bd49aedc9a36a00a3cb7de3368b194fe9026ebb18d4

  • SSDEEP

    192:6P+nM5KC/zxayGc3gzq7YjDaqzJCueT+RfbZne9s6PLRP0tkYGijY5:s5Jxayczq7Yjt9lfle9s6PL16kYGi85

Malware Config

Extracted

Family

icedid

Campaign

4165079571

C2

podiumstrtss.com

Extracted

Family

icedid

Campaign

4165079571

Targets

    • Target

      a3fa68045d0106d6db3d43df6b5997d9034f9f7d2a34148187498e4b504ebf58

    • Size

      15KB

    • MD5

      06cc2fdfd408c15a1e16adfb46e8bb38

    • SHA1

      585cfc19bdb8dfb92407e917615be1ab9dd523e5

    • SHA256

      a3fa68045d0106d6db3d43df6b5997d9034f9f7d2a34148187498e4b504ebf58

    • SHA512

      eb11a4b40eb20610f3296af8c8a7c8af5934e10922146fdc524b8212077025ccd22aa69e16aa38af56a86bd49aedc9a36a00a3cb7de3368b194fe9026ebb18d4

    • SSDEEP

      192:6P+nM5KC/zxayGc3gzq7YjDaqzJCueT+RfbZne9s6PLRP0tkYGijY5:s5Jxayczq7Yjt9lfle9s6PL16kYGi85

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Icedid family

    • Blocklisted process makes network request

MITRE ATT&CK Matrix

Tasks