General

  • Target

    Malicious_5aa8f59a7a8a93fc53b34f6a9686b603335b17c0f8548993e995f3d55ba882d1.exe

  • Size

    64KB

  • Sample

    230702-xtt55adh2z

  • MD5

    52c98b58c4e4d089d6b39eee57ee6258

  • SHA1

    0e6e2a18260e2af900ae7b1bdbd3a77b8a30a9d1

  • SHA256

    5aa8f59a7a8a93fc53b34f6a9686b603335b17c0f8548993e995f3d55ba882d1

  • SHA512

    c2c6fb85eda61391f84cf5148200fa175f0d04b665443bfcf580a5b29171ac6d1878390bf62b4863ef2082862b23ea9034e79506eb6deeba08e2456f46a8d15a

  • SSDEEP

    1536:roBHSfku/TguqNKM6C6E+YUv3EXmYOiKsU:roBS8Q0R68Xys

Malware Config

Extracted

Family

icedid

Campaign

2046050

C2

calldivorce.fun

Targets

    • Target

      Malicious_5aa8f59a7a8a93fc53b34f6a9686b603335b17c0f8548993e995f3d55ba882d1.exe

    • Size

      64KB

    • MD5

      52c98b58c4e4d089d6b39eee57ee6258

    • SHA1

      0e6e2a18260e2af900ae7b1bdbd3a77b8a30a9d1

    • SHA256

      5aa8f59a7a8a93fc53b34f6a9686b603335b17c0f8548993e995f3d55ba882d1

    • SHA512

      c2c6fb85eda61391f84cf5148200fa175f0d04b665443bfcf580a5b29171ac6d1878390bf62b4863ef2082862b23ea9034e79506eb6deeba08e2456f46a8d15a

    • SSDEEP

      1536:roBHSfku/TguqNKM6C6E+YUv3EXmYOiKsU:roBS8Q0R68Xys

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

MITRE ATT&CK Matrix

Tasks