General

  • Target

    Malicious_2ea3410476315676b86977794a4fbeef0e80cbee09bb946a329e840bcaab08c7.exe

  • Size

    64KB

  • Sample

    230702-xtrd8sce93

  • MD5

    8d515f5b601a5fbc6ee73ed4153b6d8b

  • SHA1

    8e979ec975ad7aca3ba29289ef0c7c367f5ce818

  • SHA256

    2ea3410476315676b86977794a4fbeef0e80cbee09bb946a329e840bcaab08c7

  • SHA512

    641888061b44b476b1b1615b0f733f8ae1b821f573d7afb769a5c338702f4b4313f4b7a24c6c87e7e623f387a55b5a9dec16421593c0ac2a3391fa0254089016

  • SSDEEP

    1536:roBHSfku/TguqNKM6C6E+YUv3EXmYOiKsU:roBS8Q0R68Xys

Malware Config

Extracted

Family

icedid

Campaign

2046050

C2

calldivorce.fun

Targets

    • Target

      Malicious_2ea3410476315676b86977794a4fbeef0e80cbee09bb946a329e840bcaab08c7.exe

    • Size

      64KB

    • MD5

      8d515f5b601a5fbc6ee73ed4153b6d8b

    • SHA1

      8e979ec975ad7aca3ba29289ef0c7c367f5ce818

    • SHA256

      2ea3410476315676b86977794a4fbeef0e80cbee09bb946a329e840bcaab08c7

    • SHA512

      641888061b44b476b1b1615b0f733f8ae1b821f573d7afb769a5c338702f4b4313f4b7a24c6c87e7e623f387a55b5a9dec16421593c0ac2a3391fa0254089016

    • SSDEEP

      1536:roBHSfku/TguqNKM6C6E+YUv3EXmYOiKsU:roBS8Q0R68Xys

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

MITRE ATT&CK Matrix

Tasks