General

  • Target

    Malicious_9fa428cb78eed21498f2e8fdcbca343e186d2711397f21c7274b645c98c4855c.exe

  • Size

    64KB

  • Sample

    230702-xt5a4adh4t

  • MD5

    0bca6a3319760c578b0c8b42e5ae54c8

  • SHA1

    b4687fdd44037a37aacd5357ba3242e5a69a37c7

  • SHA256

    9fa428cb78eed21498f2e8fdcbca343e186d2711397f21c7274b645c98c4855c

  • SHA512

    6d776f0ebbb42b4b96d7370c253aa0b53afd2ea826b332f75532413f977bbee553bf058c9e0a52c60ef4b957adeba8f71725c93a2d66915a8c26d0a2cffb5da9

  • SSDEEP

    1536:roBHSfku/TguqNKM6C6E+YUv3EXmYOiKsU:roBS8Q0R68Xys

Malware Config

Extracted

Family

icedid

Campaign

2046050

C2

calldivorce.fun

Targets

    • Target

      Malicious_9fa428cb78eed21498f2e8fdcbca343e186d2711397f21c7274b645c98c4855c.exe

    • Size

      64KB

    • MD5

      0bca6a3319760c578b0c8b42e5ae54c8

    • SHA1

      b4687fdd44037a37aacd5357ba3242e5a69a37c7

    • SHA256

      9fa428cb78eed21498f2e8fdcbca343e186d2711397f21c7274b645c98c4855c

    • SHA512

      6d776f0ebbb42b4b96d7370c253aa0b53afd2ea826b332f75532413f977bbee553bf058c9e0a52c60ef4b957adeba8f71725c93a2d66915a8c26d0a2cffb5da9

    • SSDEEP

      1536:roBHSfku/TguqNKM6C6E+YUv3EXmYOiKsU:roBS8Q0R68Xys

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

MITRE ATT&CK Matrix

Tasks