Resubmissions

21-01-2021 15:28

210121-qqz8wv28w6 10

19-11-2020 05:39

201119-5nq2lbgg8x 10

General

  • Target

    WSGaRIW.dll

  • Size

    140KB

  • Sample

    210121-qqz8wv28w6

  • MD5

    4fbee1cbb17b4a05ae5b5431a76087fb

  • SHA1

    44ffaa43eb2bba71325d406703ad82e010376cac

  • SHA256

    e02483eca255879ba6a57365dbecb56f5049283d8cd3f030dceca5c69f7af161

  • SHA512

    f1c0cf3e5f00e63d8edcb1cf171fde79b72945ab0d9bdd8a4ecb84b3a2b37d08eec0a59926b10a6cfaa97409a5bcb372805d09aab5e9248cde85bcb5b83fec93

Malware Config

Extracted

Family

icedid

C2

klopperflitter.cyou

Targets

    • Target

      WSGaRIW.dll

    • Size

      140KB

    • MD5

      4fbee1cbb17b4a05ae5b5431a76087fb

    • SHA1

      44ffaa43eb2bba71325d406703ad82e010376cac

    • SHA256

      e02483eca255879ba6a57365dbecb56f5049283d8cd3f030dceca5c69f7af161

    • SHA512

      f1c0cf3e5f00e63d8edcb1cf171fde79b72945ab0d9bdd8a4ecb84b3a2b37d08eec0a59926b10a6cfaa97409a5bcb372805d09aab5e9248cde85bcb5b83fec93

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • IcedID First Stage Loader

    • Blocklisted process makes network request

MITRE ATT&CK Enterprise v6

Tasks