General

  • Target

    Malicious_7c21c286be4275774638aff516766958fc4fde15e22605e84f923d8540f0d00e.exe

  • Size

    64KB

  • Sample

    230702-xtytbacf26

  • MD5

    05b5d61d10b768d4543a108789f807db

  • SHA1

    1e24ac9ee23c1242749482bede713937df20ed67

  • SHA256

    7c21c286be4275774638aff516766958fc4fde15e22605e84f923d8540f0d00e

  • SHA512

    5d1fadf5a9047c910fbf097992659bfe19e7cde61303f7681ed0fefba844ae794748a3c7ec1fbff92014d3f7b6954febe308599d7234fed7444f7e7c4f9bb6f4

  • SSDEEP

    1536:roBHSfku/TguqNKM6C6E+YUv3EXmYOiKsU:roBS8Q0R68Xys

Malware Config

Extracted

Family

icedid

Campaign

2046050

C2

calldivorce.fun

Targets

    • Target

      Malicious_7c21c286be4275774638aff516766958fc4fde15e22605e84f923d8540f0d00e.exe

    • Size

      64KB

    • MD5

      05b5d61d10b768d4543a108789f807db

    • SHA1

      1e24ac9ee23c1242749482bede713937df20ed67

    • SHA256

      7c21c286be4275774638aff516766958fc4fde15e22605e84f923d8540f0d00e

    • SHA512

      5d1fadf5a9047c910fbf097992659bfe19e7cde61303f7681ed0fefba844ae794748a3c7ec1fbff92014d3f7b6954febe308599d7234fed7444f7e7c4f9bb6f4

    • SSDEEP

      1536:roBHSfku/TguqNKM6C6E+YUv3EXmYOiKsU:roBS8Q0R68Xys

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

MITRE ATT&CK Matrix

Tasks