General

  • Target

    Malicious_dcdcd67d9474ace00a1765ed3e99f3b4e03565840db4346b1802a5486b80a78c.exe

  • Size

    64KB

  • Sample

    230702-xwxzssea6s

  • MD5

    d523d2634a22c7c96ee173f9286639e4

  • SHA1

    231593b4c44bdd52d675e5e43e5f6d6aca82c1d9

  • SHA256

    dcdcd67d9474ace00a1765ed3e99f3b4e03565840db4346b1802a5486b80a78c

  • SHA512

    f192b2a99b6479602c776dcd0ed64cb28f3cfd9b0d45a874dc7afbf6c1d33708298aae67f49710d72ad50bb53207a7e1fc586ec0236f3ef4b559ce9ed3b6a966

  • SSDEEP

    1536:roBHSfku/TguqNKM6C6E+YUv3EXmYOiKsU:roBS8Q0R68Xys

Malware Config

Extracted

Family

icedid

Campaign

2046050

C2

calldivorce.fun

Targets

    • Target

      Malicious_dcdcd67d9474ace00a1765ed3e99f3b4e03565840db4346b1802a5486b80a78c.exe

    • Size

      64KB

    • MD5

      d523d2634a22c7c96ee173f9286639e4

    • SHA1

      231593b4c44bdd52d675e5e43e5f6d6aca82c1d9

    • SHA256

      dcdcd67d9474ace00a1765ed3e99f3b4e03565840db4346b1802a5486b80a78c

    • SHA512

      f192b2a99b6479602c776dcd0ed64cb28f3cfd9b0d45a874dc7afbf6c1d33708298aae67f49710d72ad50bb53207a7e1fc586ec0236f3ef4b559ce9ed3b6a966

    • SSDEEP

      1536:roBHSfku/TguqNKM6C6E+YUv3EXmYOiKsU:roBS8Q0R68Xys

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

    • Drops file in System32 directory

MITRE ATT&CK Matrix

Tasks