General

  • Target

    dbedb87b_by_Libranalysis

  • Size

    79KB

  • Sample

    210506-4ffyyp1kne

  • MD5

    dbedb87ba150b3ceae4ac1036fe3c9bd

  • SHA1

    711ebf4c3910d2d91a5a13024aec23a47bde7d97

  • SHA256

    26903fb6387161be921360f3803668c1d86a277dee246323bf1e11ed972641b4

  • SHA512

    e042d7b3e4249273afac112a0a8d5d9c43d648ab821e9b0031cb15e4487ed92e118c855fd5dba1e45ba9029012ea2d6789f4bb869b3f0b862ca55434c4526574

Malware Config

Extracted

Family

icedid

Campaign

2941843931

C2

dsedertyhuiokle.top

Targets

    • Target

      dbedb87b_by_Libranalysis

    • Size

      79KB

    • MD5

      dbedb87ba150b3ceae4ac1036fe3c9bd

    • SHA1

      711ebf4c3910d2d91a5a13024aec23a47bde7d97

    • SHA256

      26903fb6387161be921360f3803668c1d86a277dee246323bf1e11ed972641b4

    • SHA512

      e042d7b3e4249273afac112a0a8d5d9c43d648ab821e9b0031cb15e4487ed92e118c855fd5dba1e45ba9029012ea2d6789f4bb869b3f0b862ca55434c4526574

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks