General

  • Target

    Malicious_e54e8bfe09a4a6a8d34541961fa0ed26634315d099bc4f0470e655a483620d0a.exe

  • Size

    64KB

  • Sample

    230702-xwztdscg68

  • MD5

    0f83b8c568680839f3b790fb20247fe1

  • SHA1

    9ebf5fb878c36bbf01f3f48f6faaac7909dace80

  • SHA256

    e54e8bfe09a4a6a8d34541961fa0ed26634315d099bc4f0470e655a483620d0a

  • SHA512

    0a8b260d73c9ba742b54186a8b2db81f1f252716d5029b94107db5e301b7891706f5022b2f0a1e998893e3bc06da39e64f0153e26e287dd3078ca14504a53960

  • SSDEEP

    1536:roBHSfku/TguqNKM6C6E+YUv3EXmYOiKsU:roBS8Q0R68Xys

Malware Config

Extracted

Family

icedid

Campaign

2046050

C2

calldivorce.fun

Targets

    • Target

      Malicious_e54e8bfe09a4a6a8d34541961fa0ed26634315d099bc4f0470e655a483620d0a.exe

    • Size

      64KB

    • MD5

      0f83b8c568680839f3b790fb20247fe1

    • SHA1

      9ebf5fb878c36bbf01f3f48f6faaac7909dace80

    • SHA256

      e54e8bfe09a4a6a8d34541961fa0ed26634315d099bc4f0470e655a483620d0a

    • SHA512

      0a8b260d73c9ba742b54186a8b2db81f1f252716d5029b94107db5e301b7891706f5022b2f0a1e998893e3bc06da39e64f0153e26e287dd3078ca14504a53960

    • SSDEEP

      1536:roBHSfku/TguqNKM6C6E+YUv3EXmYOiKsU:roBS8Q0R68Xys

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

    • Drops file in System32 directory

MITRE ATT&CK Matrix

Tasks