General

  • Target

    Malicious_668e03ab2e81fb28405ae6ccd2218beb96b3a3d1ed30b279f1f3ccb9a53065ed.exe

  • Size

    64KB

  • Sample

    230702-xvqt4adh61

  • MD5

    28017193465db06db79e3ebb82d9ab27

  • SHA1

    7edb31a2ba7be06d9580901ea8c9408244f4880b

  • SHA256

    668e03ab2e81fb28405ae6ccd2218beb96b3a3d1ed30b279f1f3ccb9a53065ed

  • SHA512

    166b790ac73e0296bfeb84c049a3d5882c19943f7a49a45a7f3ec2ab03dd5e8f11cb70b757f4d1b0f24912f3d786e5951acbceb2858e22b3bc147271bd993732

  • SSDEEP

    1536:roBHSfku/TguqNKM6C6E+YUv3EXmYOiKsU:roBS8Q0R68Xys

Malware Config

Extracted

Family

icedid

Campaign

2046050

C2

calldivorce.fun

Targets

    • Target

      Malicious_668e03ab2e81fb28405ae6ccd2218beb96b3a3d1ed30b279f1f3ccb9a53065ed.exe

    • Size

      64KB

    • MD5

      28017193465db06db79e3ebb82d9ab27

    • SHA1

      7edb31a2ba7be06d9580901ea8c9408244f4880b

    • SHA256

      668e03ab2e81fb28405ae6ccd2218beb96b3a3d1ed30b279f1f3ccb9a53065ed

    • SHA512

      166b790ac73e0296bfeb84c049a3d5882c19943f7a49a45a7f3ec2ab03dd5e8f11cb70b757f4d1b0f24912f3d786e5951acbceb2858e22b3bc147271bd993732

    • SSDEEP

      1536:roBHSfku/TguqNKM6C6E+YUv3EXmYOiKsU:roBS8Q0R68Xys

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

MITRE ATT&CK Matrix

Tasks