General

  • Target

    prescribe -05.21.doc

  • Size

    79KB

  • Sample

    210507-gmj137lkja

  • MD5

    f783dd95bc127688cb406fe0d5d01ff0

  • SHA1

    45ca3a0c157b8b2a38d5b20f1dd6963bb5d36a64

  • SHA256

    e3ca77e541cc28d492ff279b51d97a81a1f46a73aac808e3b7f5d4952850e3d0

  • SHA512

    c6dc3e33103f569a42c0f9033c099253fa94bf7570fed0d54b4d829486e72d8adb9cffb397dd33506ad98f30471ec6d31135efaa29bc9c147921b19ca7caf12d

Malware Config

Extracted

Family

icedid

Campaign

1436894865

C2

zasertiokil.top

Targets

    • Target

      prescribe -05.21.doc

    • Size

      79KB

    • MD5

      f783dd95bc127688cb406fe0d5d01ff0

    • SHA1

      45ca3a0c157b8b2a38d5b20f1dd6963bb5d36a64

    • SHA256

      e3ca77e541cc28d492ff279b51d97a81a1f46a73aac808e3b7f5d4952850e3d0

    • SHA512

      c6dc3e33103f569a42c0f9033c099253fa94bf7570fed0d54b4d829486e72d8adb9cffb397dd33506ad98f30471ec6d31135efaa29bc9c147921b19ca7caf12d

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks