General

  • Target

    Malicious_8bf21428a8ba767c6b0d0786cdc6a084afd03101789ad75e0d669e590e71694e.exe

  • Size

    64KB

  • Sample

    230702-xtz2dacf28

  • MD5

    e02bc705d876c4afd2a0579db12f44bf

  • SHA1

    888c9a6957830afb932cc70396e9ca0f30b673c0

  • SHA256

    8bf21428a8ba767c6b0d0786cdc6a084afd03101789ad75e0d669e590e71694e

  • SHA512

    7b9b85d80cfc6f57166567ef845f6fa044980900d4d6f3a80252644f43f8e03b0ec009089e60771f1ef619bcdd40722e9b50afcd8a69af7ac3e2fec0c7fe845b

  • SSDEEP

    1536:roBHSfku/TguqNKM6C6E+YUv3EXmYOiKsU:roBS8Q0R68Xys

Malware Config

Extracted

Family

icedid

Campaign

2046050

C2

calldivorce.fun

Targets

    • Target

      Malicious_8bf21428a8ba767c6b0d0786cdc6a084afd03101789ad75e0d669e590e71694e.exe

    • Size

      64KB

    • MD5

      e02bc705d876c4afd2a0579db12f44bf

    • SHA1

      888c9a6957830afb932cc70396e9ca0f30b673c0

    • SHA256

      8bf21428a8ba767c6b0d0786cdc6a084afd03101789ad75e0d669e590e71694e

    • SHA512

      7b9b85d80cfc6f57166567ef845f6fa044980900d4d6f3a80252644f43f8e03b0ec009089e60771f1ef619bcdd40722e9b50afcd8a69af7ac3e2fec0c7fe845b

    • SSDEEP

      1536:roBHSfku/TguqNKM6C6E+YUv3EXmYOiKsU:roBS8Q0R68Xys

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

MITRE ATT&CK Matrix

Tasks