General

  • Target

    da0921c1e416b3734272dfa619f88c8cd32e9816cdcbeeb81d9e2b2e8a95af4c.dll

  • Size

    3.4MB

  • Sample

    210302-rbr1r85846

  • MD5

    1a3d0fddf65f7cca188499edb6355192

  • SHA1

    1717402591b663767b37b3ce0635d991ace08432

  • SHA256

    da0921c1e416b3734272dfa619f88c8cd32e9816cdcbeeb81d9e2b2e8a95af4c

  • SHA512

    5a46ca0a9079a1ac6c205805a65df737d81fc438b1f6d172aec55f68c1964895d2ad1e41e1d2b309b5ddc7d7cce3d21df932293c25be2aa0fb8ff45b5d26b534

Malware Config

Extracted

Family

icedid

Botnet

1820688957

Campaign

3059128432

C2

timerework.fun

pexxota.space

Attributes
  • auth_var

    6

  • url_path

    /news/

Targets

    • Target

      da0921c1e416b3734272dfa619f88c8cd32e9816cdcbeeb81d9e2b2e8a95af4c.dll

    • Size

      3.4MB

    • MD5

      1a3d0fddf65f7cca188499edb6355192

    • SHA1

      1717402591b663767b37b3ce0635d991ace08432

    • SHA256

      da0921c1e416b3734272dfa619f88c8cd32e9816cdcbeeb81d9e2b2e8a95af4c

    • SHA512

      5a46ca0a9079a1ac6c205805a65df737d81fc438b1f6d172aec55f68c1964895d2ad1e41e1d2b309b5ddc7d7cce3d21df932293c25be2aa0fb8ff45b5d26b534

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Execution

Command-Line Interface

1
T1059

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

4
T1082

Remote System Discovery

1
T1018

Collection

Data from Local System

1
T1005

Tasks