General

  • Target

    bid-05.07.2021.doc

  • Size

    76KB

  • Sample

    210507-4p33afz6z6

  • MD5

    5134444ad549123ca5bf7b8b6013d468

  • SHA1

    744395937008debd011ad1a5d39c5e847aeffccc

  • SHA256

    111d8f3f6ff4310d03e05310dbb82ff6ffca5ffc5dd58e7590e099d367983b56

  • SHA512

    c3138dc661307ed2d8751b34a4cb59b70ba86c971b83c2d37ef870c9c2342e683c5a364ef41ff5e30e97fd8746f90efb9584b7ceac3cf7f0deb1c77f86fe84ce

Malware Config

Extracted

Family

icedid

Campaign

1420117246

C2

zasewartefiko.top

Targets

    • Target

      bid-05.07.2021.doc

    • Size

      76KB

    • MD5

      5134444ad549123ca5bf7b8b6013d468

    • SHA1

      744395937008debd011ad1a5d39c5e847aeffccc

    • SHA256

      111d8f3f6ff4310d03e05310dbb82ff6ffca5ffc5dd58e7590e099d367983b56

    • SHA512

      c3138dc661307ed2d8751b34a4cb59b70ba86c971b83c2d37ef870c9c2342e683c5a364ef41ff5e30e97fd8746f90efb9584b7ceac3cf7f0deb1c77f86fe84ce

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks