General

  • Target

    Malicious_992fe80dbc3c7e0a3dbeab21529c9f9855107f210958941be32d30575e1bcd0c.exe

  • Size

    64KB

  • Sample

    230702-xvvhaadh7x

  • MD5

    d2114a2cd15e6276aa1fc13e836a3655

  • SHA1

    12e8ebf319e1856f8d39bca49d46ea5744383467

  • SHA256

    992fe80dbc3c7e0a3dbeab21529c9f9855107f210958941be32d30575e1bcd0c

  • SHA512

    872d499f39b8a336e27bbb22ec0e3c0efc77443d29c06d81fd0c9119e91d5c9b7b476be815fa3e6b21336104aa72eee5c4c639c33d02f9ab4b2800fe52d639f4

  • SSDEEP

    1536:roBHSfku/TguqNKM6C6E+YUv3EXmYOiKsU:roBS8Q0R68Xys

Malware Config

Extracted

Family

icedid

Campaign

2046050

C2

calldivorce.fun

Targets

    • Target

      Malicious_992fe80dbc3c7e0a3dbeab21529c9f9855107f210958941be32d30575e1bcd0c.exe

    • Size

      64KB

    • MD5

      d2114a2cd15e6276aa1fc13e836a3655

    • SHA1

      12e8ebf319e1856f8d39bca49d46ea5744383467

    • SHA256

      992fe80dbc3c7e0a3dbeab21529c9f9855107f210958941be32d30575e1bcd0c

    • SHA512

      872d499f39b8a336e27bbb22ec0e3c0efc77443d29c06d81fd0c9119e91d5c9b7b476be815fa3e6b21336104aa72eee5c4c639c33d02f9ab4b2800fe52d639f4

    • SSDEEP

      1536:roBHSfku/TguqNKM6C6E+YUv3EXmYOiKsU:roBS8Q0R68Xys

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

MITRE ATT&CK Matrix

Tasks