General

  • Target

    Malicious_e96f32be2ca8d80f7a58167295702c9c9e6f89080126915696dac5f1d00414d4.exe

  • Size

    64KB

  • Sample

    230702-xw1exsea6x

  • MD5

    dd2da8c3a77e120d10c96bcf286a98bb

  • SHA1

    8fc5769e31c0f6cca72588439bd961f037cc21db

  • SHA256

    e96f32be2ca8d80f7a58167295702c9c9e6f89080126915696dac5f1d00414d4

  • SHA512

    d822c3585b3b5623977929e7634d519f363315936f6e38023c63373e70833eb0f47b56f9897add7b949e8db46517574e96b74dc2c52e098cd06e61e6857b00ca

  • SSDEEP

    1536:roBHSfku/TguqNKM6C6E+YUv3EXmYOiKsU:roBS8Q0R68Xys

Malware Config

Extracted

Family

icedid

Campaign

2046050

C2

calldivorce.fun

Targets

    • Target

      Malicious_e96f32be2ca8d80f7a58167295702c9c9e6f89080126915696dac5f1d00414d4.exe

    • Size

      64KB

    • MD5

      dd2da8c3a77e120d10c96bcf286a98bb

    • SHA1

      8fc5769e31c0f6cca72588439bd961f037cc21db

    • SHA256

      e96f32be2ca8d80f7a58167295702c9c9e6f89080126915696dac5f1d00414d4

    • SHA512

      d822c3585b3b5623977929e7634d519f363315936f6e38023c63373e70833eb0f47b56f9897add7b949e8db46517574e96b74dc2c52e098cd06e61e6857b00ca

    • SSDEEP

      1536:roBHSfku/TguqNKM6C6E+YUv3EXmYOiKsU:roBS8Q0R68Xys

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

MITRE ATT&CK Matrix

Tasks