General

  • Target

    Malicious_f675caa2990d9296e5f2e496dcbfb262cd8dbe923443090f84906dc8e61709f3.exe

  • Size

    64KB

  • Sample

    230702-xw6a6scg82

  • MD5

    27f531e70380d380b7a54deb6495d5a6

  • SHA1

    92f2b25e0ada354d1f4a9c230163ded4d29add72

  • SHA256

    f675caa2990d9296e5f2e496dcbfb262cd8dbe923443090f84906dc8e61709f3

  • SHA512

    2bbc2c692f8f2f2bc1b268aea679c4a209635882266aad04e053f9c9a196d77bd68ae1435be2dd7a543dba708b7fc684021ec6f408c2714c66a73d559ba8a7a0

  • SSDEEP

    1536:roBHSfku/TguqNKM6C6E+YUv3EXmYOiKsU:roBS8Q0R68Xys

Malware Config

Extracted

Family

icedid

Campaign

2046050

C2

calldivorce.fun

Targets

    • Target

      Malicious_f675caa2990d9296e5f2e496dcbfb262cd8dbe923443090f84906dc8e61709f3.exe

    • Size

      64KB

    • MD5

      27f531e70380d380b7a54deb6495d5a6

    • SHA1

      92f2b25e0ada354d1f4a9c230163ded4d29add72

    • SHA256

      f675caa2990d9296e5f2e496dcbfb262cd8dbe923443090f84906dc8e61709f3

    • SHA512

      2bbc2c692f8f2f2bc1b268aea679c4a209635882266aad04e053f9c9a196d77bd68ae1435be2dd7a543dba708b7fc684021ec6f408c2714c66a73d559ba8a7a0

    • SSDEEP

      1536:roBHSfku/TguqNKM6C6E+YUv3EXmYOiKsU:roBS8Q0R68Xys

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

MITRE ATT&CK Matrix

Tasks