General

  • Target

    Malicious_f5ddceac37c7c80eb947fe1a0fb7798fe856e184f843520f8555d6d5c5adce36.exe

  • Size

    64KB

  • Sample

    230702-xw51eacg79

  • MD5

    d695e8c6147a37337bc6e54e6a805c22

  • SHA1

    89a42fe3498b3d1166f129cd61b0724dee898242

  • SHA256

    f5ddceac37c7c80eb947fe1a0fb7798fe856e184f843520f8555d6d5c5adce36

  • SHA512

    37651548d22aa1b875c84c74ab7747766e5cd9062a6962b242a903f3c79c4f0bf94716cde6e6e31731e12dcab7b79373beff86622d837644f87912ca5f5723f8

  • SSDEEP

    1536:roBHSfku/TguqNKM6C6E+YUv3EXmYOiKsU:roBS8Q0R68Xys

Malware Config

Extracted

Family

icedid

Campaign

2046050

C2

calldivorce.fun

Targets

    • Target

      Malicious_f5ddceac37c7c80eb947fe1a0fb7798fe856e184f843520f8555d6d5c5adce36.exe

    • Size

      64KB

    • MD5

      d695e8c6147a37337bc6e54e6a805c22

    • SHA1

      89a42fe3498b3d1166f129cd61b0724dee898242

    • SHA256

      f5ddceac37c7c80eb947fe1a0fb7798fe856e184f843520f8555d6d5c5adce36

    • SHA512

      37651548d22aa1b875c84c74ab7747766e5cd9062a6962b242a903f3c79c4f0bf94716cde6e6e31731e12dcab7b79373beff86622d837644f87912ca5f5723f8

    • SSDEEP

      1536:roBHSfku/TguqNKM6C6E+YUv3EXmYOiKsU:roBS8Q0R68Xys

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

MITRE ATT&CK Matrix

Tasks