General

  • Target

    Malicious_b874bba6c6d550b68618243f2a17865d39a1220c3c954e165889df171474da4f.exe

  • Size

    64KB

  • Sample

    230702-xwgykscg35

  • MD5

    8d2a66d5c16017642c9178d4d552861d

  • SHA1

    8c4fb88e02e0b223343c3f140e2360a3e7e7299b

  • SHA256

    b874bba6c6d550b68618243f2a17865d39a1220c3c954e165889df171474da4f

  • SHA512

    313e80f2d57028ca364940ca803090311d466ef43d2d76274099fcb2fda81751b8b10199323806ca2175f3ad2cb32e80e2ecd3da4f31a8d7c61c2f3c50e29b6e

  • SSDEEP

    1536:roBHSfku/TguqNKM6C6E+YUv3EXmYOiKsU:roBS8Q0R68Xys

Malware Config

Extracted

Family

icedid

Campaign

2046050

C2

calldivorce.fun

Targets

    • Target

      Malicious_b874bba6c6d550b68618243f2a17865d39a1220c3c954e165889df171474da4f.exe

    • Size

      64KB

    • MD5

      8d2a66d5c16017642c9178d4d552861d

    • SHA1

      8c4fb88e02e0b223343c3f140e2360a3e7e7299b

    • SHA256

      b874bba6c6d550b68618243f2a17865d39a1220c3c954e165889df171474da4f

    • SHA512

      313e80f2d57028ca364940ca803090311d466ef43d2d76274099fcb2fda81751b8b10199323806ca2175f3ad2cb32e80e2ecd3da4f31a8d7c61c2f3c50e29b6e

    • SSDEEP

      1536:roBHSfku/TguqNKM6C6E+YUv3EXmYOiKsU:roBS8Q0R68Xys

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

MITRE ATT&CK Matrix

Tasks