General

  • Target

    Malicious_e9dda3221697c048945efd63b55f2e63d1b0f8866c2a6fbca98ec40e76f2df86.exe

  • Size

    64KB

  • Sample

    230702-xwzhmaea6w

  • MD5

    6ebb9e4f6879e94c0bf88b4d73286058

  • SHA1

    025c119da75ae30ecf18d00152a4e86f25015b43

  • SHA256

    e9dda3221697c048945efd63b55f2e63d1b0f8866c2a6fbca98ec40e76f2df86

  • SHA512

    26ad0f7cf6f5556b26fd58166e18f224eceae37a677fcb467cab62ad2492a7aa5777bde579e0e11e0f6fe41c8918580df459c1050d326e0a26119356cc78e0f3

  • SSDEEP

    1536:roBHSfku/TguqNKM6C6E+YUv3EXmYOiKsUR:roBS8Q0R68XysG

Malware Config

Extracted

Family

icedid

Campaign

2046050

C2

calldivorce.fun

Targets

    • Target

      Malicious_e9dda3221697c048945efd63b55f2e63d1b0f8866c2a6fbca98ec40e76f2df86.exe

    • Size

      64KB

    • MD5

      6ebb9e4f6879e94c0bf88b4d73286058

    • SHA1

      025c119da75ae30ecf18d00152a4e86f25015b43

    • SHA256

      e9dda3221697c048945efd63b55f2e63d1b0f8866c2a6fbca98ec40e76f2df86

    • SHA512

      26ad0f7cf6f5556b26fd58166e18f224eceae37a677fcb467cab62ad2492a7aa5777bde579e0e11e0f6fe41c8918580df459c1050d326e0a26119356cc78e0f3

    • SSDEEP

      1536:roBHSfku/TguqNKM6C6E+YUv3EXmYOiKsUR:roBS8Q0R68XysG

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

MITRE ATT&CK Matrix

Tasks