General

  • Target

    Malicious_6b1d66517156ac8db84a9c91b27f1b2790ec58cf309dd0e66b49a2f7030e40b3.exe

  • Size

    64KB

  • Sample

    230702-xtwnysdh21

  • MD5

    de35a14f47b61dab64aa80c4d6b4ba0e

  • SHA1

    fe0eab4f906aaafe364a851e8f4fd317b9b1c95a

  • SHA256

    6b1d66517156ac8db84a9c91b27f1b2790ec58cf309dd0e66b49a2f7030e40b3

  • SHA512

    c4d026748761bbaccb35e346c66c7f807993e65248842cfdb7d8f6bfd0ed8df6936d099299beab05afeb73cd15266ba1f60eb656f80b1c70a9b25c6d9dbef653

  • SSDEEP

    1536:roBHSfku/TguqNKM6C6E+YUv3EXmYOiKsU:roBS8Q0R68Xys

Malware Config

Extracted

Family

icedid

Campaign

2046050

C2

calldivorce.fun

Targets

    • Target

      Malicious_6b1d66517156ac8db84a9c91b27f1b2790ec58cf309dd0e66b49a2f7030e40b3.exe

    • Size

      64KB

    • MD5

      de35a14f47b61dab64aa80c4d6b4ba0e

    • SHA1

      fe0eab4f906aaafe364a851e8f4fd317b9b1c95a

    • SHA256

      6b1d66517156ac8db84a9c91b27f1b2790ec58cf309dd0e66b49a2f7030e40b3

    • SHA512

      c4d026748761bbaccb35e346c66c7f807993e65248842cfdb7d8f6bfd0ed8df6936d099299beab05afeb73cd15266ba1f60eb656f80b1c70a9b25c6d9dbef653

    • SSDEEP

      1536:roBHSfku/TguqNKM6C6E+YUv3EXmYOiKsU:roBS8Q0R68Xys

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

MITRE ATT&CK Matrix

Tasks