General

  • Target

    Malicious_d962299b8997738e4e25ad50064a496320cc763ce4ae17c8f122025e728b35b0.exe

  • Size

    64KB

  • Sample

    230702-xwwrqsea5y

  • MD5

    01a7bc6db89f4e9df7d44402c23db337

  • SHA1

    a226bf6c815d20a91f639080ca6ecde84f978f22

  • SHA256

    d962299b8997738e4e25ad50064a496320cc763ce4ae17c8f122025e728b35b0

  • SHA512

    7a65a2dfa6fa9f752469f8ef783029754c50bb07edf25c3e376ea36b5d0450d149fdc3949a0897280f06b1dc93322977bd5666e12421f5893262d4093605cf58

  • SSDEEP

    1536:roBHSfku/TguqNKM6C6E+YUv3EXmYOiKsU:roBS8Q0R68Xys

Malware Config

Extracted

Family

icedid

Campaign

2046050

C2

calldivorce.fun

Targets

    • Target

      Malicious_d962299b8997738e4e25ad50064a496320cc763ce4ae17c8f122025e728b35b0.exe

    • Size

      64KB

    • MD5

      01a7bc6db89f4e9df7d44402c23db337

    • SHA1

      a226bf6c815d20a91f639080ca6ecde84f978f22

    • SHA256

      d962299b8997738e4e25ad50064a496320cc763ce4ae17c8f122025e728b35b0

    • SHA512

      7a65a2dfa6fa9f752469f8ef783029754c50bb07edf25c3e376ea36b5d0450d149fdc3949a0897280f06b1dc93322977bd5666e12421f5893262d4093605cf58

    • SSDEEP

      1536:roBHSfku/TguqNKM6C6E+YUv3EXmYOiKsU:roBS8Q0R68Xys

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

MITRE ATT&CK Matrix

Tasks