General

  • Target

    Malicious_f0b00e03b0cdb0fb5bb6d2c8310bb7a19d607179220d284abe7013ae72e6329f.exe

  • Size

    64KB

  • Sample

    230702-xw5dwaea7v

  • MD5

    ee1b0c5a8bb93969066eb74f4df8babb

  • SHA1

    90159d00a09307bb4009faa4dee3d227594608a2

  • SHA256

    f0b00e03b0cdb0fb5bb6d2c8310bb7a19d607179220d284abe7013ae72e6329f

  • SHA512

    f1ce1ca4455f4d7f24911fd041c1d1b72e992e68f5cdffce60e92abfd0d6914c7dc6ccb5e6fa047dece83d86412b5095220336b993fbb484e93c17a7ee672312

  • SSDEEP

    1536:roBHSfku/TguqNKM6C6E+YUv3EXmYOiKsU:roBS8Q0R68Xys

Malware Config

Extracted

Family

icedid

Campaign

2046050

C2

calldivorce.fun

Targets

    • Target

      Malicious_f0b00e03b0cdb0fb5bb6d2c8310bb7a19d607179220d284abe7013ae72e6329f.exe

    • Size

      64KB

    • MD5

      ee1b0c5a8bb93969066eb74f4df8babb

    • SHA1

      90159d00a09307bb4009faa4dee3d227594608a2

    • SHA256

      f0b00e03b0cdb0fb5bb6d2c8310bb7a19d607179220d284abe7013ae72e6329f

    • SHA512

      f1ce1ca4455f4d7f24911fd041c1d1b72e992e68f5cdffce60e92abfd0d6914c7dc6ccb5e6fa047dece83d86412b5095220336b993fbb484e93c17a7ee672312

    • SSDEEP

      1536:roBHSfku/TguqNKM6C6E+YUv3EXmYOiKsU:roBS8Q0R68Xys

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

MITRE ATT&CK Matrix

Tasks