General

  • Target

    f143869b_by_Libranalysis

  • Size

    75KB

  • Sample

    210506-9md3883q12

  • MD5

    f143869b5567d92152addee5f40b2544

  • SHA1

    641ba7fc05997aca01b83dfbaa078c86d4b6b7df

  • SHA256

    9e7906cf5f653a70e1a30828d805dcf165b50a7e664cb94de562771203219e21

  • SHA512

    655f4d350a12b39aadbdf7eae54c2e7f39bdd751bede45c28c044f207aef5e4e80abe3031b069331e76a28b2ae1e29438b4fe13815832bd9e25f6484bb1a62fd

Malware Config

Extracted

Family

icedid

Campaign

1436894865

C2

jikkiaderwa.top

Targets

    • Target

      f143869b_by_Libranalysis

    • Size

      75KB

    • MD5

      f143869b5567d92152addee5f40b2544

    • SHA1

      641ba7fc05997aca01b83dfbaa078c86d4b6b7df

    • SHA256

      9e7906cf5f653a70e1a30828d805dcf165b50a7e664cb94de562771203219e21

    • SHA512

      655f4d350a12b39aadbdf7eae54c2e7f39bdd751bede45c28c044f207aef5e4e80abe3031b069331e76a28b2ae1e29438b4fe13815832bd9e25f6484bb1a62fd

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks