General

  • Target

    Malicious_f3587884f02b429e23b0fa6542d93a3cbd38958874149f4505c7c6129f0c962a.exe

  • Size

    64KB

  • Sample

    230702-xw6xpscg84

  • MD5

    df43ca0645e793b0d672276d9ca13431

  • SHA1

    fb5686a952ccc1179e727da1078f99ddf61853c1

  • SHA256

    f3587884f02b429e23b0fa6542d93a3cbd38958874149f4505c7c6129f0c962a

  • SHA512

    0030ce95ba01862d2e6502a0e281061d6e7e9c29c3e897f5b2acbfcb4145a995eb6459ba445335adf14a3139d9ebde29af1bf3f32abfb39b9db7cd0fea6953cf

  • SSDEEP

    1536:roBHSfku/TguqNKM6C6E+YUv3EXmYOiKsU:roBS8Q0R68Xys

Malware Config

Extracted

Family

icedid

Campaign

2046050

C2

calldivorce.fun

Targets

    • Target

      Malicious_f3587884f02b429e23b0fa6542d93a3cbd38958874149f4505c7c6129f0c962a.exe

    • Size

      64KB

    • MD5

      df43ca0645e793b0d672276d9ca13431

    • SHA1

      fb5686a952ccc1179e727da1078f99ddf61853c1

    • SHA256

      f3587884f02b429e23b0fa6542d93a3cbd38958874149f4505c7c6129f0c962a

    • SHA512

      0030ce95ba01862d2e6502a0e281061d6e7e9c29c3e897f5b2acbfcb4145a995eb6459ba445335adf14a3139d9ebde29af1bf3f32abfb39b9db7cd0fea6953cf

    • SSDEEP

      1536:roBHSfku/TguqNKM6C6E+YUv3EXmYOiKsU:roBS8Q0R68Xys

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

MITRE ATT&CK Matrix

Tasks