General

  • Target

    Malicious_e8e6bee971988aed0a86c547442b146ccd2d4425fb3e32ddc28803cb2ca7aa7b.exe

  • Size

    64KB

  • Sample

    230702-xwy7vsea6v

  • MD5

    d635b12656f8b2e965a072d8b7244cd3

  • SHA1

    83be23bc30180331ddf88e1c547450106df6cbaf

  • SHA256

    e8e6bee971988aed0a86c547442b146ccd2d4425fb3e32ddc28803cb2ca7aa7b

  • SHA512

    8b24a9c548f58f742b6f62a7d4fa44c737fddb0380608d08db17de89545172df927b92b220ef057726a6ee62b7bbe8c3724cc20066cee925659fd93848132194

  • SSDEEP

    1536:roBHSfku/TguqNKM6C6E+YUv3EXmYOiKsU:roBS8Q0R68Xys

Malware Config

Extracted

Family

icedid

Campaign

2046050

C2

calldivorce.fun

Targets

    • Target

      Malicious_e8e6bee971988aed0a86c547442b146ccd2d4425fb3e32ddc28803cb2ca7aa7b.exe

    • Size

      64KB

    • MD5

      d635b12656f8b2e965a072d8b7244cd3

    • SHA1

      83be23bc30180331ddf88e1c547450106df6cbaf

    • SHA256

      e8e6bee971988aed0a86c547442b146ccd2d4425fb3e32ddc28803cb2ca7aa7b

    • SHA512

      8b24a9c548f58f742b6f62a7d4fa44c737fddb0380608d08db17de89545172df927b92b220ef057726a6ee62b7bbe8c3724cc20066cee925659fd93848132194

    • SSDEEP

      1536:roBHSfku/TguqNKM6C6E+YUv3EXmYOiKsU:roBS8Q0R68Xys

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

MITRE ATT&CK Matrix

Tasks