General

  • Target

    Malicious_6f4fcf8afdf98d720720ee0315993f8a3c952215e2beb219ef619482f4314c7c.exe

  • Size

    64KB

  • Sample

    230702-xtxagscf24

  • MD5

    c3b64723724da3c709b5ee1c15ce0a1b

  • SHA1

    ad1ed13aa661581d5f5adce860f21ebf449db4b7

  • SHA256

    6f4fcf8afdf98d720720ee0315993f8a3c952215e2beb219ef619482f4314c7c

  • SHA512

    ef574cf82f3b507f3ab4967ec21a8cd282e3e958441f74decf444efc6c4bfea6a0521708c12e3066157dbb76ca4de47c7e318fc4219b7f76c1e5ffa23c3c0dd0

  • SSDEEP

    1536:roBHSfku/TguqNKM6C6E+YUv3EXmYOiKsU:roBS8Q0R68Xys

Malware Config

Extracted

Family

icedid

Campaign

2046050

C2

calldivorce.fun

Targets

    • Target

      Malicious_6f4fcf8afdf98d720720ee0315993f8a3c952215e2beb219ef619482f4314c7c.exe

    • Size

      64KB

    • MD5

      c3b64723724da3c709b5ee1c15ce0a1b

    • SHA1

      ad1ed13aa661581d5f5adce860f21ebf449db4b7

    • SHA256

      6f4fcf8afdf98d720720ee0315993f8a3c952215e2beb219ef619482f4314c7c

    • SHA512

      ef574cf82f3b507f3ab4967ec21a8cd282e3e958441f74decf444efc6c4bfea6a0521708c12e3066157dbb76ca4de47c7e318fc4219b7f76c1e5ffa23c3c0dd0

    • SSDEEP

      1536:roBHSfku/TguqNKM6C6E+YUv3EXmYOiKsU:roBS8Q0R68Xys

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

MITRE ATT&CK Matrix

Tasks