General

  • Target

    Malicious_dba92a39b2f3bc32b50e31293f05c47cac7cef461551bb62e8691304d2cb7a61.exe

  • Size

    64KB

  • Sample

    230702-xwxc9sea51

  • MD5

    415b2801fca286a0e5a598c04c871e6b

  • SHA1

    ba982d7cdac9606f7a4a20910da93c6962b4310f

  • SHA256

    dba92a39b2f3bc32b50e31293f05c47cac7cef461551bb62e8691304d2cb7a61

  • SHA512

    24abaaa4a52e0ecf8a741d5cc702c0f719d53ad5e9a9fe79c9bd3bc2f47532e7ea50f2eff5f0f1f966f604cfba4d7ddce9869f2c1fca88ad99de1f787d51f073

  • SSDEEP

    1536:roBHSfku/TguqNKM6C6E+YUv3EXmYOiKsU:roBS8Q0R68Xys

Malware Config

Extracted

Family

icedid

Campaign

2046050

C2

calldivorce.fun

Targets

    • Target

      Malicious_dba92a39b2f3bc32b50e31293f05c47cac7cef461551bb62e8691304d2cb7a61.exe

    • Size

      64KB

    • MD5

      415b2801fca286a0e5a598c04c871e6b

    • SHA1

      ba982d7cdac9606f7a4a20910da93c6962b4310f

    • SHA256

      dba92a39b2f3bc32b50e31293f05c47cac7cef461551bb62e8691304d2cb7a61

    • SHA512

      24abaaa4a52e0ecf8a741d5cc702c0f719d53ad5e9a9fe79c9bd3bc2f47532e7ea50f2eff5f0f1f966f604cfba4d7ddce9869f2c1fca88ad99de1f787d51f073

    • SSDEEP

      1536:roBHSfku/TguqNKM6C6E+YUv3EXmYOiKsU:roBS8Q0R68Xys

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

MITRE ATT&CK Matrix

Tasks