General

  • Target

    Malicious_d232dafb1db00d29e3e0ebdbb244423bdb1f77dea1ea9dbbbe56889bf7f200c6.exe

  • Size

    64KB

  • Sample

    230702-xwv57scg62

  • MD5

    f8cc3bff0a49bc40f492af83ede344e2

  • SHA1

    a3019936d65c2a6db47d22168498ebf627427a2c

  • SHA256

    d232dafb1db00d29e3e0ebdbb244423bdb1f77dea1ea9dbbbe56889bf7f200c6

  • SHA512

    7f06ae435f194613f3333b9ea721c6add4c262e972369ec4c2cb6de7ec8f860105a56210e1eb74e1abeaba53cd3bca7f89ed736447e6af854fa26634bb6832fb

  • SSDEEP

    1536:roBHSfku/TguqNKM6C6E+YUv3EXmYOiKsU:roBS8Q0R68Xys

Malware Config

Extracted

Family

icedid

Campaign

2046050

C2

calldivorce.fun

Targets

    • Target

      Malicious_d232dafb1db00d29e3e0ebdbb244423bdb1f77dea1ea9dbbbe56889bf7f200c6.exe

    • Size

      64KB

    • MD5

      f8cc3bff0a49bc40f492af83ede344e2

    • SHA1

      a3019936d65c2a6db47d22168498ebf627427a2c

    • SHA256

      d232dafb1db00d29e3e0ebdbb244423bdb1f77dea1ea9dbbbe56889bf7f200c6

    • SHA512

      7f06ae435f194613f3333b9ea721c6add4c262e972369ec4c2cb6de7ec8f860105a56210e1eb74e1abeaba53cd3bca7f89ed736447e6af854fa26634bb6832fb

    • SSDEEP

      1536:roBHSfku/TguqNKM6C6E+YUv3EXmYOiKsU:roBS8Q0R68Xys

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

MITRE ATT&CK Matrix

Tasks