General

  • Target

    Malicious_cee30f3ef82cdf799c237282ab1319601aca2cadfff37621dc3c1a396cefa147.exe

  • Size

    64KB

  • Sample

    230702-xws1vacg56

  • MD5

    c6448ceb4cf052c3d64dc1555078a765

  • SHA1

    6267ccdd54b8b31b51be4d00d4ae935a158a2110

  • SHA256

    cee30f3ef82cdf799c237282ab1319601aca2cadfff37621dc3c1a396cefa147

  • SHA512

    9657365e2b7267253d383c0cd2daeea30c4fed9f21b5b4c80569b8c43ef0db1b1848491a50f447b643ce04d9de3766b8556554d7d4908435675d7e86c87b2eba

  • SSDEEP

    1536:roBHSfku/TguqNKM6C6E+YUv3EXmYOiKsU:roBS8Q0R68Xys

Malware Config

Extracted

Family

icedid

Campaign

2046050

C2

calldivorce.fun

Targets

    • Target

      Malicious_cee30f3ef82cdf799c237282ab1319601aca2cadfff37621dc3c1a396cefa147.exe

    • Size

      64KB

    • MD5

      c6448ceb4cf052c3d64dc1555078a765

    • SHA1

      6267ccdd54b8b31b51be4d00d4ae935a158a2110

    • SHA256

      cee30f3ef82cdf799c237282ab1319601aca2cadfff37621dc3c1a396cefa147

    • SHA512

      9657365e2b7267253d383c0cd2daeea30c4fed9f21b5b4c80569b8c43ef0db1b1848491a50f447b643ce04d9de3766b8556554d7d4908435675d7e86c87b2eba

    • SSDEEP

      1536:roBHSfku/TguqNKM6C6E+YUv3EXmYOiKsU:roBS8Q0R68Xys

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

MITRE ATT&CK Matrix

Tasks