General

  • Target

    prescribe -05.21.doc

  • Size

    79KB

  • Sample

    210505-fhtzg27vmn

  • MD5

    f2802408d46abe4dfd91855961aeea1a

  • SHA1

    552d4f910aef793bda3629c1677e68e48105b060

  • SHA256

    208697cb7cb04b2a6e4bfa49606d50956c2131901f83ffa4b21240352a662ea3

  • SHA512

    5247de009d874a8582aa551407fa35d6d7037311a8a92a249b364a8fe67d76168d5d29dbc72e0d0520299ed8926811745ab9583229da1108d50f63a21bbd394e

Malware Config

Extracted

Family

icedid

Campaign

2925066312

C2

barcafokliresd.top

Targets

    • Target

      prescribe -05.21.doc

    • Size

      79KB

    • MD5

      f2802408d46abe4dfd91855961aeea1a

    • SHA1

      552d4f910aef793bda3629c1677e68e48105b060

    • SHA256

      208697cb7cb04b2a6e4bfa49606d50956c2131901f83ffa4b21240352a662ea3

    • SHA512

      5247de009d874a8582aa551407fa35d6d7037311a8a92a249b364a8fe67d76168d5d29dbc72e0d0520299ed8926811745ab9583229da1108d50f63a21bbd394e

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks