General

  • Target

    Malicious_6c04bf4266ef887058c857011f3e5adbc593c7a62127ce207ef4f6bf2c45332e.exe

  • Size

    64KB

  • Sample

    230702-xtwzqacf23

  • MD5

    1dd638654391dc7dc08496950ec6943a

  • SHA1

    09a9b3a478c11e80fbe6db3cf8c4961c4773cffe

  • SHA256

    6c04bf4266ef887058c857011f3e5adbc593c7a62127ce207ef4f6bf2c45332e

  • SHA512

    73d1bbb03d909b34e913909ac24e59c1bd0579ba5bc58039e930474c4075c74005b81009f7de60f697d659dada42b735f43421ae583447b8de93b112445d7721

  • SSDEEP

    1536:roBHSfku/TguqNKM6C6E+YUv3EXmYOiKsU:roBS8Q0R68Xys

Malware Config

Extracted

Family

icedid

Campaign

2046050

C2

calldivorce.fun

Targets

    • Target

      Malicious_6c04bf4266ef887058c857011f3e5adbc593c7a62127ce207ef4f6bf2c45332e.exe

    • Size

      64KB

    • MD5

      1dd638654391dc7dc08496950ec6943a

    • SHA1

      09a9b3a478c11e80fbe6db3cf8c4961c4773cffe

    • SHA256

      6c04bf4266ef887058c857011f3e5adbc593c7a62127ce207ef4f6bf2c45332e

    • SHA512

      73d1bbb03d909b34e913909ac24e59c1bd0579ba5bc58039e930474c4075c74005b81009f7de60f697d659dada42b735f43421ae583447b8de93b112445d7721

    • SSDEEP

      1536:roBHSfku/TguqNKM6C6E+YUv3EXmYOiKsU:roBS8Q0R68Xys

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

MITRE ATT&CK Matrix

Tasks