General

  • Target

    Malicious_e02590b6cdf60685b49e5a753c63dee7b7365f56b17f13c4ac2cb038d20746db.exe

  • Size

    64KB

  • Sample

    230702-xw12fsea6y

  • MD5

    288dc0d7f83d0bc3c5812d46037003ff

  • SHA1

    81fc896f87e6dbac2b0825260754dc2047621d1b

  • SHA256

    e02590b6cdf60685b49e5a753c63dee7b7365f56b17f13c4ac2cb038d20746db

  • SHA512

    ad1c8780e56c65bb4f3e3f631711369ddf646f8d393dd626cd6d4ef9e2df4c714486aeb30334ed0468aa6c1abf817a1a348b4b97d66c68a410965fe287d1f975

  • SSDEEP

    1536:roBHSfku/TguqNKM6C6E+YUv3EXmYOiKsU:roBS8Q0R68Xys

Malware Config

Extracted

Family

icedid

Campaign

2046050

C2

calldivorce.fun

Targets

    • Target

      Malicious_e02590b6cdf60685b49e5a753c63dee7b7365f56b17f13c4ac2cb038d20746db.exe

    • Size

      64KB

    • MD5

      288dc0d7f83d0bc3c5812d46037003ff

    • SHA1

      81fc896f87e6dbac2b0825260754dc2047621d1b

    • SHA256

      e02590b6cdf60685b49e5a753c63dee7b7365f56b17f13c4ac2cb038d20746db

    • SHA512

      ad1c8780e56c65bb4f3e3f631711369ddf646f8d393dd626cd6d4ef9e2df4c714486aeb30334ed0468aa6c1abf817a1a348b4b97d66c68a410965fe287d1f975

    • SSDEEP

      1536:roBHSfku/TguqNKM6C6E+YUv3EXmYOiKsU:roBS8Q0R68Xys

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

MITRE ATT&CK Matrix

Tasks