General

  • Target

    Malicious_38dc4eb0be3a9d753e58eeae18756b87604de9d915625fd07d887a15c7eaf1c6.exe

  • Size

    64KB

  • Sample

    230702-xvcbpscf44

  • MD5

    df172cee7e2e99ad19dff4d9d01a1fe7

  • SHA1

    8a9d0f4ff35ca842c65dcffcec465d55bc0aa4af

  • SHA256

    38dc4eb0be3a9d753e58eeae18756b87604de9d915625fd07d887a15c7eaf1c6

  • SHA512

    201593414a6108184ada2b690830605d99acf5d5fce7a6fea86c4394471f07a53c4d8b75bfd8791e0d7e1bad634628042db59ea8c341929a3b7ee10115ee9205

  • SSDEEP

    1536:roBHSfku/TguqNKM6C6E+YUv3EXmYOiKsU:roBS8Q0R68Xys

Malware Config

Extracted

Family

icedid

Campaign

2046050

C2

calldivorce.fun

Targets

    • Target

      Malicious_38dc4eb0be3a9d753e58eeae18756b87604de9d915625fd07d887a15c7eaf1c6.exe

    • Size

      64KB

    • MD5

      df172cee7e2e99ad19dff4d9d01a1fe7

    • SHA1

      8a9d0f4ff35ca842c65dcffcec465d55bc0aa4af

    • SHA256

      38dc4eb0be3a9d753e58eeae18756b87604de9d915625fd07d887a15c7eaf1c6

    • SHA512

      201593414a6108184ada2b690830605d99acf5d5fce7a6fea86c4394471f07a53c4d8b75bfd8791e0d7e1bad634628042db59ea8c341929a3b7ee10115ee9205

    • SSDEEP

      1536:roBHSfku/TguqNKM6C6E+YUv3EXmYOiKsU:roBS8Q0R68Xys

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

    • Drops file in System32 directory

MITRE ATT&CK Matrix

Tasks