General

  • Target

    Malicious_faf814ea092349c9b1742672e247a8cbe9d30633ea8b9a21ff60829adc2e506f.exe

  • Size

    64KB

  • Sample

    230702-xw8fjacg87

  • MD5

    591bef3264651601878686c40c022d49

  • SHA1

    cd3b540c3e162621620a17d44bfcec04b445df94

  • SHA256

    faf814ea092349c9b1742672e247a8cbe9d30633ea8b9a21ff60829adc2e506f

  • SHA512

    b1d8a135e917c483adc145e01e0377b8417accac5bc6cb8e92985b54b3f33f386a8413b024b72c8d9b446aac0a4daf6b70c7d9c33114c67dd27988f53d2319a3

  • SSDEEP

    1536:roBHSfku/TguqNKM6C6E+YUv3EXmYOiKsU:roBS8Q0R68Xys

Malware Config

Extracted

Family

icedid

Campaign

2046050

C2

calldivorce.fun

Targets

    • Target

      Malicious_faf814ea092349c9b1742672e247a8cbe9d30633ea8b9a21ff60829adc2e506f.exe

    • Size

      64KB

    • MD5

      591bef3264651601878686c40c022d49

    • SHA1

      cd3b540c3e162621620a17d44bfcec04b445df94

    • SHA256

      faf814ea092349c9b1742672e247a8cbe9d30633ea8b9a21ff60829adc2e506f

    • SHA512

      b1d8a135e917c483adc145e01e0377b8417accac5bc6cb8e92985b54b3f33f386a8413b024b72c8d9b446aac0a4daf6b70c7d9c33114c67dd27988f53d2319a3

    • SSDEEP

      1536:roBHSfku/TguqNKM6C6E+YUv3EXmYOiKsU:roBS8Q0R68Xys

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

MITRE ATT&CK Matrix

Tasks