General

  • Target

    Malicious_d619bf2e1754d3511c9821ee30d9b55825cdfaf39ab4a4e42f24591a4e4adbf8.exe

  • Size

    64KB

  • Sample

    230702-xwwfzacg63

  • MD5

    bfef9c1d4db6d5710e850e49ad9ad3d2

  • SHA1

    408d8b5a6a29bc3bac3a6cc6c575cd4f57ae51e8

  • SHA256

    d619bf2e1754d3511c9821ee30d9b55825cdfaf39ab4a4e42f24591a4e4adbf8

  • SHA512

    ff2db30ed10b5c98c494ec7106835497a68881bfb4a45eb123fe7bc263bf69ca6c8f04d0bb52db89229b27db6376bd96e20f8213aac1577fe472415b35b680cd

  • SSDEEP

    1536:roBHSfku/TguqNKM6C6E+YUv3EXmYOiKsU:roBS8Q0R68Xys

Malware Config

Extracted

Family

icedid

Campaign

2046050

C2

calldivorce.fun

Targets

    • Target

      Malicious_d619bf2e1754d3511c9821ee30d9b55825cdfaf39ab4a4e42f24591a4e4adbf8.exe

    • Size

      64KB

    • MD5

      bfef9c1d4db6d5710e850e49ad9ad3d2

    • SHA1

      408d8b5a6a29bc3bac3a6cc6c575cd4f57ae51e8

    • SHA256

      d619bf2e1754d3511c9821ee30d9b55825cdfaf39ab4a4e42f24591a4e4adbf8

    • SHA512

      ff2db30ed10b5c98c494ec7106835497a68881bfb4a45eb123fe7bc263bf69ca6c8f04d0bb52db89229b27db6376bd96e20f8213aac1577fe472415b35b680cd

    • SSDEEP

      1536:roBHSfku/TguqNKM6C6E+YUv3EXmYOiKsU:roBS8Q0R68Xys

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

MITRE ATT&CK Matrix

Tasks