General

  • Target

    Malicious_dabccb8ad0fdc2b8a27a45abfb50897b06b2044d9ddf145d8fef2834bf031ce0.exe

  • Size

    64KB

  • Sample

    230702-xww3haea5z

  • MD5

    36da651694f7fd1185ae5553920bd244

  • SHA1

    e1c9256f8411eecbeeb54b8ee6bfd55dc235ffcb

  • SHA256

    dabccb8ad0fdc2b8a27a45abfb50897b06b2044d9ddf145d8fef2834bf031ce0

  • SHA512

    3aa9fdf85ec6ea6abec0c936e8c71df686d5e36d6e7ce63a7c9380d0ed0757751a5155584183eec355d43493de1d8856fd1ded57d28c27019c590727ff812d14

  • SSDEEP

    1536:roBHSfku/TguqNKM6C6E+YUv3EXmYOiKsU:roBS8Q0R68Xys

Malware Config

Extracted

Family

icedid

Campaign

2046050

C2

calldivorce.fun

Targets

    • Target

      Malicious_dabccb8ad0fdc2b8a27a45abfb50897b06b2044d9ddf145d8fef2834bf031ce0.exe

    • Size

      64KB

    • MD5

      36da651694f7fd1185ae5553920bd244

    • SHA1

      e1c9256f8411eecbeeb54b8ee6bfd55dc235ffcb

    • SHA256

      dabccb8ad0fdc2b8a27a45abfb50897b06b2044d9ddf145d8fef2834bf031ce0

    • SHA512

      3aa9fdf85ec6ea6abec0c936e8c71df686d5e36d6e7ce63a7c9380d0ed0757751a5155584183eec355d43493de1d8856fd1ded57d28c27019c590727ff812d14

    • SSDEEP

      1536:roBHSfku/TguqNKM6C6E+YUv3EXmYOiKsU:roBS8Q0R68Xys

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

MITRE ATT&CK Matrix

Tasks