General

  • Target

    Malicious_effb4df5248b918d7a9ed27b63001edbaf3d8e8058b3cb7c97de78584e5299ea.exe

  • Size

    64KB

  • Sample

    230702-xw434scg78

  • MD5

    0fa2ab74a8c14d4cb985f0b3edb6ca57

  • SHA1

    0021a6c3c1c1ea1fa68019ef472c9091381e90a8

  • SHA256

    effb4df5248b918d7a9ed27b63001edbaf3d8e8058b3cb7c97de78584e5299ea

  • SHA512

    8990233b15b7d80f13a444f332b25d2b9b5e0361488396f693223b0ce1295480d857bf6993a7b1819cfb4f642a42227e0945295186f7f2742c615fff88a11c67

  • SSDEEP

    1536:roBHSfku/TguqNKM6C6E+YUv3EXmYOiKsU:roBS8Q0R68Xys

Malware Config

Extracted

Family

icedid

Campaign

2046050

C2

calldivorce.fun

Targets

    • Target

      Malicious_effb4df5248b918d7a9ed27b63001edbaf3d8e8058b3cb7c97de78584e5299ea.exe

    • Size

      64KB

    • MD5

      0fa2ab74a8c14d4cb985f0b3edb6ca57

    • SHA1

      0021a6c3c1c1ea1fa68019ef472c9091381e90a8

    • SHA256

      effb4df5248b918d7a9ed27b63001edbaf3d8e8058b3cb7c97de78584e5299ea

    • SHA512

      8990233b15b7d80f13a444f332b25d2b9b5e0361488396f693223b0ce1295480d857bf6993a7b1819cfb4f642a42227e0945295186f7f2742c615fff88a11c67

    • SSDEEP

      1536:roBHSfku/TguqNKM6C6E+YUv3EXmYOiKsU:roBS8Q0R68Xys

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

MITRE ATT&CK Matrix

Tasks