General

  • Target

    sample4.exe

  • Size

    2.0MB

  • Sample

    210122-bjrgqzzqhx

  • MD5

    5009b8bcf024704c8b23e42c492f118c

  • SHA1

    df607367a88b5610a224909efb8debeb0d90f487

  • SHA256

    30f099660904079afcd445409cfd2eca735fab49dda522f03ed60d47f9f21bdc

  • SHA512

    70c4d7c6b9124246def27e28b69f2eb30bac85a5c0e8b38cf593222bec02c561143ebf0995946d1c30ef5441a6152cf587ef2d70651482374017a321df1c8e3b

Malware Config

Extracted

Family

icedid

C2

gegemony4you.top

Targets

    • Target

      sample4.exe

    • Size

      2.0MB

    • MD5

      5009b8bcf024704c8b23e42c492f118c

    • SHA1

      df607367a88b5610a224909efb8debeb0d90f487

    • SHA256

      30f099660904079afcd445409cfd2eca735fab49dda522f03ed60d47f9f21bdc

    • SHA512

      70c4d7c6b9124246def27e28b69f2eb30bac85a5c0e8b38cf593222bec02c561143ebf0995946d1c30ef5441a6152cf587ef2d70651482374017a321df1c8e3b

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks