General

  • Target

    Malicious_bfe8fc70929b3e06ef0541fd0c5b7f3ed3a74583d1cb38619c86a7e952a142df.exe

  • Size

    64KB

  • Sample

    230702-xwla1acg42

  • MD5

    452d8f80080a1a76d8eb9c601c097009

  • SHA1

    1ca6c31333cc8190f37cf56c1b994968f9953062

  • SHA256

    bfe8fc70929b3e06ef0541fd0c5b7f3ed3a74583d1cb38619c86a7e952a142df

  • SHA512

    f9a62fd2b1517fc08ea19420bf12db395a7b4675e7ab1f32f689aa43ae95e30cd62eb4df8b2e022b414e1f9dfb29afa20b7e806027c0a55ff443ea2d7c109961

  • SSDEEP

    1536:roBHSfku/TguqNKM6C6E+YUv3EXmYOiKsU:roBS8Q0R68Xys

Malware Config

Extracted

Family

icedid

Campaign

2046050

C2

calldivorce.fun

Targets

    • Target

      Malicious_bfe8fc70929b3e06ef0541fd0c5b7f3ed3a74583d1cb38619c86a7e952a142df.exe

    • Size

      64KB

    • MD5

      452d8f80080a1a76d8eb9c601c097009

    • SHA1

      1ca6c31333cc8190f37cf56c1b994968f9953062

    • SHA256

      bfe8fc70929b3e06ef0541fd0c5b7f3ed3a74583d1cb38619c86a7e952a142df

    • SHA512

      f9a62fd2b1517fc08ea19420bf12db395a7b4675e7ab1f32f689aa43ae95e30cd62eb4df8b2e022b414e1f9dfb29afa20b7e806027c0a55ff443ea2d7c109961

    • SSDEEP

      1536:roBHSfku/TguqNKM6C6E+YUv3EXmYOiKsU:roBS8Q0R68Xys

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

MITRE ATT&CK Matrix

Tasks