General

  • Target

    Malicious_eb66d3f914844f0967c4e1969fa44442a269cc777161ee25bd6cfd8b43cec60a.exe

  • Size

    64KB

  • Sample

    230702-xw2yracg73

  • MD5

    a0e73f55a9087b72d069e31396bfc31b

  • SHA1

    ed0cc929154f8ed5416586be160e9f5da8bafa49

  • SHA256

    eb66d3f914844f0967c4e1969fa44442a269cc777161ee25bd6cfd8b43cec60a

  • SHA512

    28cace589d6d030a6fee5f0280e3a350e500fdf79eda2dff4f5cd672b9da2cb60fac53c4a86fdffca5fc2b811ddde8f3b27a573a65375bd0d33d8bba794ff09f

  • SSDEEP

    1536:roBHSfku/TguqNKM6C6E+YUv3EXmYOiKsU:roBS8Q0R68Xys

Malware Config

Extracted

Family

icedid

Campaign

2046050

C2

calldivorce.fun

Targets

    • Target

      Malicious_eb66d3f914844f0967c4e1969fa44442a269cc777161ee25bd6cfd8b43cec60a.exe

    • Size

      64KB

    • MD5

      a0e73f55a9087b72d069e31396bfc31b

    • SHA1

      ed0cc929154f8ed5416586be160e9f5da8bafa49

    • SHA256

      eb66d3f914844f0967c4e1969fa44442a269cc777161ee25bd6cfd8b43cec60a

    • SHA512

      28cace589d6d030a6fee5f0280e3a350e500fdf79eda2dff4f5cd672b9da2cb60fac53c4a86fdffca5fc2b811ddde8f3b27a573a65375bd0d33d8bba794ff09f

    • SSDEEP

      1536:roBHSfku/TguqNKM6C6E+YUv3EXmYOiKsU:roBS8Q0R68Xys

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

MITRE ATT&CK Matrix

Tasks