General

  • Target

    particulars.05.21.doc

  • Size

    65KB

  • Sample

    210512-zhnjr41dg6

  • MD5

    c33304d6de97b0263aa4277716ee9730

  • SHA1

    52bd645c127469b4c18486deb270151352a19296

  • SHA256

    799c92dbf9afd51ce4760192ef65c42432f006e0fbab34971019bfe53926b879

  • SHA512

    5276eb3c5b5274f389b5c679cc7b466a9d35c7d50b8754dc75a8af9e0c88814e27aac125918885475692915fee47ee3264e57663afc710448a3633a47573016b

Malware Config

Extracted

Family

icedid

Campaign

2857955836

C2

tyretclaster.club

Targets

    • Target

      particulars.05.21.doc

    • Size

      65KB

    • MD5

      c33304d6de97b0263aa4277716ee9730

    • SHA1

      52bd645c127469b4c18486deb270151352a19296

    • SHA256

      799c92dbf9afd51ce4760192ef65c42432f006e0fbab34971019bfe53926b879

    • SHA512

      5276eb3c5b5274f389b5c679cc7b466a9d35c7d50b8754dc75a8af9e0c88814e27aac125918885475692915fee47ee3264e57663afc710448a3633a47573016b

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks