General

  • Target

    b63e3ccc1accb0fde3af7bcfbd0554d3.dll

  • Size

    1.4MB

  • Sample

    210226-96v6tzkcv2

  • MD5

    b63e3ccc1accb0fde3af7bcfbd0554d3

  • SHA1

    6a6cf5af326f2ae625b97cb3658366d45608e6b9

  • SHA256

    0982c38ddad347ce0ff426106db78f3e51b723d7d90308a970ef43ef84fc8d75

  • SHA512

    51dfced4855cc288132e20879e8dc9c8626b6ea5ec71b9ded9be9ab01b8e77c3bdedc817dfde9a456aa957e32f8e9dac6c7640b86facd7429d549d3279ead17b

Malware Config

Extracted

Family

icedid

Campaign

3109461289

Targets

    • Target

      b63e3ccc1accb0fde3af7bcfbd0554d3.dll

    • Size

      1.4MB

    • MD5

      b63e3ccc1accb0fde3af7bcfbd0554d3

    • SHA1

      6a6cf5af326f2ae625b97cb3658366d45608e6b9

    • SHA256

      0982c38ddad347ce0ff426106db78f3e51b723d7d90308a970ef43ef84fc8d75

    • SHA512

      51dfced4855cc288132e20879e8dc9c8626b6ea5ec71b9ded9be9ab01b8e77c3bdedc817dfde9a456aa957e32f8e9dac6c7640b86facd7429d549d3279ead17b

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

1
T1082

Tasks