General

  • Target

    Malicious_e0ebff1821ecd5cd958dff9da365733c8cd8a996481cbbd5430eea6da5c52aef.exe

  • Size

    64KB

  • Sample

    230702-xwyw4acg67

  • MD5

    de6e94136c457a64f27ee6d16e1db992

  • SHA1

    ecbd1d607dff80343c51038177adb9ef6004be22

  • SHA256

    e0ebff1821ecd5cd958dff9da365733c8cd8a996481cbbd5430eea6da5c52aef

  • SHA512

    be7da9fe5f3fe2059d3a4c339722fc3c3c55f3e5bc1df5a3f8cc032d886dd2b487f03ab118d63e2266bea08b74e1be7f15cd60e6a8291b135674096114cc1cd7

  • SSDEEP

    1536:roBHSfku/TguqNKM6C6E+YUv3EXmYOiKsU:roBS8Q0R68Xys

Malware Config

Extracted

Family

icedid

Campaign

2046050

C2

calldivorce.fun

Targets

    • Target

      Malicious_e0ebff1821ecd5cd958dff9da365733c8cd8a996481cbbd5430eea6da5c52aef.exe

    • Size

      64KB

    • MD5

      de6e94136c457a64f27ee6d16e1db992

    • SHA1

      ecbd1d607dff80343c51038177adb9ef6004be22

    • SHA256

      e0ebff1821ecd5cd958dff9da365733c8cd8a996481cbbd5430eea6da5c52aef

    • SHA512

      be7da9fe5f3fe2059d3a4c339722fc3c3c55f3e5bc1df5a3f8cc032d886dd2b487f03ab118d63e2266bea08b74e1be7f15cd60e6a8291b135674096114cc1cd7

    • SSDEEP

      1536:roBHSfku/TguqNKM6C6E+YUv3EXmYOiKsU:roBS8Q0R68Xys

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

MITRE ATT&CK Matrix

Tasks