General

  • Target

    Malicious_e438fa5a1f8f036e884a41b850ad330a190ef16ecf050a59c179af7ca891a683.exe

  • Size

    64KB

  • Sample

    230702-xw1qpacg69

  • MD5

    712d8a335e38cc6fc8a1a79fcc1f9484

  • SHA1

    1996d0e8edcdb0c1ad9e2db2ee083362f60e125f

  • SHA256

    e438fa5a1f8f036e884a41b850ad330a190ef16ecf050a59c179af7ca891a683

  • SHA512

    e5533855eb98f62ff7fae453482f83a6d8729732e334c8f976c0aaa34a6c87a63bbca77dfb75ecb33a266252ce612679d13af3ce559f13d295729c05a69137a1

  • SSDEEP

    1536:roBHSfku/TguqNKM6C6E+YUv3EXmYOiKsU9:roBS8Q0R68Xysc

Malware Config

Extracted

Family

icedid

Campaign

2046050

C2

calldivorce.fun

Targets

    • Target

      Malicious_e438fa5a1f8f036e884a41b850ad330a190ef16ecf050a59c179af7ca891a683.exe

    • Size

      64KB

    • MD5

      712d8a335e38cc6fc8a1a79fcc1f9484

    • SHA1

      1996d0e8edcdb0c1ad9e2db2ee083362f60e125f

    • SHA256

      e438fa5a1f8f036e884a41b850ad330a190ef16ecf050a59c179af7ca891a683

    • SHA512

      e5533855eb98f62ff7fae453482f83a6d8729732e334c8f976c0aaa34a6c87a63bbca77dfb75ecb33a266252ce612679d13af3ce559f13d295729c05a69137a1

    • SSDEEP

      1536:roBHSfku/TguqNKM6C6E+YUv3EXmYOiKsU9:roBS8Q0R68Xysc

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

MITRE ATT&CK Matrix

Tasks