General

  • Target

    Malicious_6f52b74f489ce8f2e6fd747ab9176e6443e191a7a6c849431dfe238222b4150b.exe

  • Size

    64KB

  • Sample

    230702-xtxw1sdh3s

  • MD5

    fbeb2565a04946e1f7109b7b7161c44d

  • SHA1

    2b7cb27aae0396631bb1d6b7d975a3880ffaadc2

  • SHA256

    6f52b74f489ce8f2e6fd747ab9176e6443e191a7a6c849431dfe238222b4150b

  • SHA512

    b90f38aee3a8a0b7848196131c31fdb66a5f83132b25b31b2bc0bf1acd325f1fff1f6e5802efc51dad21cf31947e8a667649f6f52a1a63d3171201c950462461

  • SSDEEP

    1536:roBHSfku/TguqNKM6C6E+YUv3EXmYOiKsU:roBS8Q0R68Xys

Malware Config

Extracted

Family

icedid

Campaign

2046050

C2

calldivorce.fun

Targets

    • Target

      Malicious_6f52b74f489ce8f2e6fd747ab9176e6443e191a7a6c849431dfe238222b4150b.exe

    • Size

      64KB

    • MD5

      fbeb2565a04946e1f7109b7b7161c44d

    • SHA1

      2b7cb27aae0396631bb1d6b7d975a3880ffaadc2

    • SHA256

      6f52b74f489ce8f2e6fd747ab9176e6443e191a7a6c849431dfe238222b4150b

    • SHA512

      b90f38aee3a8a0b7848196131c31fdb66a5f83132b25b31b2bc0bf1acd325f1fff1f6e5802efc51dad21cf31947e8a667649f6f52a1a63d3171201c950462461

    • SSDEEP

      1536:roBHSfku/TguqNKM6C6E+YUv3EXmYOiKsU:roBS8Q0R68Xys

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

MITRE ATT&CK Matrix

Tasks