General

  • Target

    Malicious_4f801d7fbd27e4c8ab017e3421cab550d88d267fdc9dabd9a5a80162558aeedf.exe

  • Size

    64KB

  • Sample

    230702-xttvcsdh2y

  • MD5

    4e8553eac501f0da23a8c11d96350b70

  • SHA1

    4705fb59c575352991ff1dd580d381275c819734

  • SHA256

    4f801d7fbd27e4c8ab017e3421cab550d88d267fdc9dabd9a5a80162558aeedf

  • SHA512

    9766fbb6cfca6fe48effb2df13f1c35f5285572399596eab21585fef5c5c98aa6fbf0dbaaeb5cd17c49ac58d93b8630e124bfaaec9779fae306ed94758a0e763

  • SSDEEP

    1536:roBHSfku/TguqNKM6C6E+YUv3EXmYOiKsU:roBS8Q0R68Xys

Malware Config

Extracted

Family

icedid

Campaign

2046050

C2

calldivorce.fun

Targets

    • Target

      Malicious_4f801d7fbd27e4c8ab017e3421cab550d88d267fdc9dabd9a5a80162558aeedf.exe

    • Size

      64KB

    • MD5

      4e8553eac501f0da23a8c11d96350b70

    • SHA1

      4705fb59c575352991ff1dd580d381275c819734

    • SHA256

      4f801d7fbd27e4c8ab017e3421cab550d88d267fdc9dabd9a5a80162558aeedf

    • SHA512

      9766fbb6cfca6fe48effb2df13f1c35f5285572399596eab21585fef5c5c98aa6fbf0dbaaeb5cd17c49ac58d93b8630e124bfaaec9779fae306ed94758a0e763

    • SSDEEP

      1536:roBHSfku/TguqNKM6C6E+YUv3EXmYOiKsU:roBS8Q0R68Xys

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

MITRE ATT&CK Matrix

Tasks