General

  • Target

    f7caed3ce87cbdba9e6cbf93cf483424bfe7a43f47a820679ec4598cf3ed70c1.exe

  • Size

    180KB

  • Sample

    250224-m2967symv9

  • MD5

    31b39dbbf77406ced577c5b9e71c6a83

  • SHA1

    f3c38e32e814ecabd06a0b1c6fa4f419b0d81eb8

  • SHA256

    f7caed3ce87cbdba9e6cbf93cf483424bfe7a43f47a820679ec4598cf3ed70c1

  • SHA512

    922c7102f0e9f7528e6c934fc26ac5e0c2b96ade8da3a4d1fe81276ce576d3d1a928b14b377b5b55e3683b5e313ff256021994fd4cb08d4aa7d3c3b4747e4eea

  • SSDEEP

    3072:aUDZ3U6U9IXYZM+4P2vOP5w+hrEI0TmCsb0:aUDZ3OCZMOprWQ0

Malware Config

Extracted

Family

icedid

C2

loadlisboa.casa

Targets

    • Target

      f7caed3ce87cbdba9e6cbf93cf483424bfe7a43f47a820679ec4598cf3ed70c1.exe

    • Size

      180KB

    • MD5

      31b39dbbf77406ced577c5b9e71c6a83

    • SHA1

      f3c38e32e814ecabd06a0b1c6fa4f419b0d81eb8

    • SHA256

      f7caed3ce87cbdba9e6cbf93cf483424bfe7a43f47a820679ec4598cf3ed70c1

    • SHA512

      922c7102f0e9f7528e6c934fc26ac5e0c2b96ade8da3a4d1fe81276ce576d3d1a928b14b377b5b55e3683b5e313ff256021994fd4cb08d4aa7d3c3b4747e4eea

    • SSDEEP

      3072:aUDZ3U6U9IXYZM+4P2vOP5w+hrEI0TmCsb0:aUDZ3OCZMOprWQ0

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Icedid family

    • IcedID First Stage Loader

    • Blocklisted process makes network request

MITRE ATT&CK Enterprise v15

Tasks