General

  • Target

    Malicious_eb78feabc81935e03997ea5fe5e8215438d9812713f7ea1185faee55d4a5bb0a.exe

  • Size

    64KB

  • Sample

    230702-xw29hscg74

  • MD5

    5a83608a69fc4cc389df17825cbdca8e

  • SHA1

    0923f6919dfd59f6d6a0cf57c282c8f4310af826

  • SHA256

    eb78feabc81935e03997ea5fe5e8215438d9812713f7ea1185faee55d4a5bb0a

  • SHA512

    1254d7ffcad47a47de0d64857e23f2f8777e069623247096960b7eb0070435e49ec47fe431ec5b2b850f4ddb890b3302ef61cd9fd1e2576a0bce86c8f8e6e5db

  • SSDEEP

    1536:roBHSfku/TguqNKM6C6E+YUv3EXmYOiKsU:roBS8Q0R68Xys

Malware Config

Extracted

Family

icedid

Campaign

2046050

C2

calldivorce.fun

Targets

    • Target

      Malicious_eb78feabc81935e03997ea5fe5e8215438d9812713f7ea1185faee55d4a5bb0a.exe

    • Size

      64KB

    • MD5

      5a83608a69fc4cc389df17825cbdca8e

    • SHA1

      0923f6919dfd59f6d6a0cf57c282c8f4310af826

    • SHA256

      eb78feabc81935e03997ea5fe5e8215438d9812713f7ea1185faee55d4a5bb0a

    • SHA512

      1254d7ffcad47a47de0d64857e23f2f8777e069623247096960b7eb0070435e49ec47fe431ec5b2b850f4ddb890b3302ef61cd9fd1e2576a0bce86c8f8e6e5db

    • SSDEEP

      1536:roBHSfku/TguqNKM6C6E+YUv3EXmYOiKsU:roBS8Q0R68Xys

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

MITRE ATT&CK Matrix

Tasks