General

  • Target

    inquiry,05.05.2021.doc

  • Size

    79KB

  • Sample

    210505-r7kteqxrwa

  • MD5

    a60f00b085daf1454fc229164be49862

  • SHA1

    71adf78e05ff5af07d9dd6154c1ea0695a013eb6

  • SHA256

    21905e3b19ea3c56637b8c5315cbe422c78d7d8fa48ff6358057b305e748cbfb

  • SHA512

    5194f26b1428ba7de66682bf9907c303024faed51797e8d6f4aefe0daf5b8a78727777930e00c1bed015477a4195f9d12cf84de320c7905596e99c17960394f8

Malware Config

Extracted

Family

icedid

Campaign

1386562008

C2

zasertiokil.top

Targets

    • Target

      inquiry,05.05.2021.doc

    • Size

      79KB

    • MD5

      a60f00b085daf1454fc229164be49862

    • SHA1

      71adf78e05ff5af07d9dd6154c1ea0695a013eb6

    • SHA256

      21905e3b19ea3c56637b8c5315cbe422c78d7d8fa48ff6358057b305e748cbfb

    • SHA512

      5194f26b1428ba7de66682bf9907c303024faed51797e8d6f4aefe0daf5b8a78727777930e00c1bed015477a4195f9d12cf84de320c7905596e99c17960394f8

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks