General

  • Target

    Malicious_eb0adca8c97d6a9330de7020745a4055422273f8a2eb1e853eefbaf376ae7be8.exe

  • Size

    64KB

  • Sample

    230702-xw2mzscg72

  • MD5

    a7836149b137ff301b3248e2d48c096c

  • SHA1

    2b74ce76950976a2c4d2505b807c256d4caa37c2

  • SHA256

    eb0adca8c97d6a9330de7020745a4055422273f8a2eb1e853eefbaf376ae7be8

  • SHA512

    17111cc3c0dec84c61c850b49db2d7814afd30277ca4c0675afa9e8873bf1c195161be6345b6e8005bf1d0a2a019d11882988958f561de4b889b7f998c5a32f1

  • SSDEEP

    1536:roBHSfku/TguqNKM6C6E+YUv3EXmYOiKsU:roBS8Q0R68Xys

Malware Config

Extracted

Family

icedid

Campaign

2046050

C2

calldivorce.fun

Targets

    • Target

      Malicious_eb0adca8c97d6a9330de7020745a4055422273f8a2eb1e853eefbaf376ae7be8.exe

    • Size

      64KB

    • MD5

      a7836149b137ff301b3248e2d48c096c

    • SHA1

      2b74ce76950976a2c4d2505b807c256d4caa37c2

    • SHA256

      eb0adca8c97d6a9330de7020745a4055422273f8a2eb1e853eefbaf376ae7be8

    • SHA512

      17111cc3c0dec84c61c850b49db2d7814afd30277ca4c0675afa9e8873bf1c195161be6345b6e8005bf1d0a2a019d11882988958f561de4b889b7f998c5a32f1

    • SSDEEP

      1536:roBHSfku/TguqNKM6C6E+YUv3EXmYOiKsU:roBS8Q0R68Xys

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

MITRE ATT&CK Matrix

Tasks