General

  • Target

    Malicious_f2c89729e3932f3be096774b74be83724474ef15cc64241dd1b8497a8a439cb2.exe

  • Size

    64KB

  • Sample

    230702-xw5pmsea7w

  • MD5

    b0b1d2fe1d77682a0ac84a24d1f65165

  • SHA1

    6fffa941e0d8512fa8b52ac1e0869f6ab2e1aa27

  • SHA256

    f2c89729e3932f3be096774b74be83724474ef15cc64241dd1b8497a8a439cb2

  • SHA512

    3c02086952a2683161718b0f0034972b30e5629d019a40c292dd947187765053885d2fc4469b32574ba8b5efb89052cc42a01fa212e17e14a4b89c29f54adbb1

  • SSDEEP

    1536:roBHSfku/TguqNKM6C6E+YUv3EXmYOiKsU:roBS8Q0R68Xys

Malware Config

Extracted

Family

icedid

Campaign

2046050

C2

calldivorce.fun

Targets

    • Target

      Malicious_f2c89729e3932f3be096774b74be83724474ef15cc64241dd1b8497a8a439cb2.exe

    • Size

      64KB

    • MD5

      b0b1d2fe1d77682a0ac84a24d1f65165

    • SHA1

      6fffa941e0d8512fa8b52ac1e0869f6ab2e1aa27

    • SHA256

      f2c89729e3932f3be096774b74be83724474ef15cc64241dd1b8497a8a439cb2

    • SHA512

      3c02086952a2683161718b0f0034972b30e5629d019a40c292dd947187765053885d2fc4469b32574ba8b5efb89052cc42a01fa212e17e14a4b89c29f54adbb1

    • SSDEEP

      1536:roBHSfku/TguqNKM6C6E+YUv3EXmYOiKsU:roBS8Q0R68Xys

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

MITRE ATT&CK Matrix

Tasks