General

  • Target

    legal paper 010.20.doc

  • Size

    101KB

  • Sample

    201020-yw9lnxxzcs

  • MD5

    fa6dd33e6694d584f2a16e342addb2b4

  • SHA1

    dfeea7c92ce47d096df414faee5d64f765411aac

  • SHA256

    2c074e34cde05236cbb5cf4f7bdc00b3e92b7804f82eafc42d9866fcc6c65287

  • SHA512

    7a820e6c78ef47893830b50589d736efa60b093a36cfcea2acac7bf6c1840b93a9bb4866d74136a44cdb7ea6b580cab4c836b00917a3fa540346dc40cd19fa2c

Malware Config

Extracted

Family

icedid

Campaign

1949629567

Targets

    • Target

      legal paper 010.20.doc

    • Size

      101KB

    • MD5

      fa6dd33e6694d584f2a16e342addb2b4

    • SHA1

      dfeea7c92ce47d096df414faee5d64f765411aac

    • SHA256

      2c074e34cde05236cbb5cf4f7bdc00b3e92b7804f82eafc42d9866fcc6c65287

    • SHA512

      7a820e6c78ef47893830b50589d736efa60b093a36cfcea2acac7bf6c1840b93a9bb4866d74136a44cdb7ea6b580cab4c836b00917a3fa540346dc40cd19fa2c

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Downloads MZ/PE file

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks