General

  • Target

    Malicious_edb3c3eb4f6af3a27ffd9252a02390b13a1025258b2eb36f5c555faa5f555fda.exe

  • Size

    64KB

  • Sample

    230702-xw3v2scg75

  • MD5

    52c0d9262af34b2c7a1b8f1df3e8af4a

  • SHA1

    1c6288262102568f5a49b0d1299f6d39552e6b3f

  • SHA256

    edb3c3eb4f6af3a27ffd9252a02390b13a1025258b2eb36f5c555faa5f555fda

  • SHA512

    f62133d1190c2e39ce4f627c8fead9ceeb7479aa9424cf538991f15f5ce5004966cef54f5dc205271afa6ffe21de9465e1c996bed85a7895342b14ed5c5a4d7a

  • SSDEEP

    1536:roBHSfku/TguqNKM6C6E+YUv3EXmYOiKsU:roBS8Q0R68Xys

Malware Config

Extracted

Family

icedid

Campaign

2046050

C2

calldivorce.fun

Targets

    • Target

      Malicious_edb3c3eb4f6af3a27ffd9252a02390b13a1025258b2eb36f5c555faa5f555fda.exe

    • Size

      64KB

    • MD5

      52c0d9262af34b2c7a1b8f1df3e8af4a

    • SHA1

      1c6288262102568f5a49b0d1299f6d39552e6b3f

    • SHA256

      edb3c3eb4f6af3a27ffd9252a02390b13a1025258b2eb36f5c555faa5f555fda

    • SHA512

      f62133d1190c2e39ce4f627c8fead9ceeb7479aa9424cf538991f15f5ce5004966cef54f5dc205271afa6ffe21de9465e1c996bed85a7895342b14ed5c5a4d7a

    • SSDEEP

      1536:roBHSfku/TguqNKM6C6E+YUv3EXmYOiKsU:roBS8Q0R68Xys

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

MITRE ATT&CK Matrix

Tasks