General

  • Target

    Malicious_fa5e06f2a6985d809c2fbd9412eb2f5bcada7520b73968837699a2c4003ca89f.exe

  • Size

    64KB

  • Sample

    230702-xw68gaea7x

  • MD5

    daa9de0cf8de186cc26529d10332d2e6

  • SHA1

    de630f08e45dab54a5d9ac26a3cc3050f90cdb0e

  • SHA256

    fa5e06f2a6985d809c2fbd9412eb2f5bcada7520b73968837699a2c4003ca89f

  • SHA512

    baa1795ee744fe980c0ad7cb0bd3597cb7ab3f18e25757e39553c35d5165adf60e96a135d8e790d97bdfb480ffe61d16a36783561edb558d6acea2273652dff0

  • SSDEEP

    1536:roBHSfku/TguqNKM6C6E+YUv3EXmYOiKsU:roBS8Q0R68Xys

Malware Config

Extracted

Family

icedid

Campaign

2046050

C2

calldivorce.fun

Targets

    • Target

      Malicious_fa5e06f2a6985d809c2fbd9412eb2f5bcada7520b73968837699a2c4003ca89f.exe

    • Size

      64KB

    • MD5

      daa9de0cf8de186cc26529d10332d2e6

    • SHA1

      de630f08e45dab54a5d9ac26a3cc3050f90cdb0e

    • SHA256

      fa5e06f2a6985d809c2fbd9412eb2f5bcada7520b73968837699a2c4003ca89f

    • SHA512

      baa1795ee744fe980c0ad7cb0bd3597cb7ab3f18e25757e39553c35d5165adf60e96a135d8e790d97bdfb480ffe61d16a36783561edb558d6acea2273652dff0

    • SSDEEP

      1536:roBHSfku/TguqNKM6C6E+YUv3EXmYOiKsU:roBS8Q0R68Xys

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

    • Drops file in System32 directory

MITRE ATT&CK Matrix

Tasks