General

  • Target

    2031990c23b02f14927d6e81c767671f030228a52f56f.exe

  • Size

    333KB

  • Sample

    211022-ycdbqadaan

  • MD5

    1af134c8d0c42c155d731736acdad0ed

  • SHA1

    6fbdd621b41cad2aeec78697ef480e7ac9e4320d

  • SHA256

    2031990c23b02f14927d6e81c767671f030228a52f56ffba1dbc5a20d5cd3552

  • SHA512

    f0199832b27387951bc00bc19346b94ae8b4a324be4e3fcc4d331fe76904ea5234a91ba5cbd3e4f0d14fb4dd408804d130069dd3aef300ef48c0805cfa57e409

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://directorycart.com/upload/

http://tierzahnarzt.at/upload/

http://streetofcards.com/upload/

http://ycdfzd.com/upload/

http://successcoachceo.com/upload/

http://uhvu.cn/upload/

http://japanarticle.com/upload/

rc4.i32
rc4.i32

Extracted

Family

icedid

Campaign

1875681804

C2

enticationmetho.ink

Targets

    • Target

      2031990c23b02f14927d6e81c767671f030228a52f56f.exe

    • Size

      333KB

    • MD5

      1af134c8d0c42c155d731736acdad0ed

    • SHA1

      6fbdd621b41cad2aeec78697ef480e7ac9e4320d

    • SHA256

      2031990c23b02f14927d6e81c767671f030228a52f56ffba1dbc5a20d5cd3552

    • SHA512

      f0199832b27387951bc00bc19346b94ae8b4a324be4e3fcc4d331fe76904ea5234a91ba5cbd3e4f0d14fb4dd408804d130069dd3aef300ef48c0805cfa57e409

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • suricata: ET MALWARE Win32/IcedID Request Cookie

      suricata: ET MALWARE Win32/IcedID Request Cookie

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Deletes itself

    • Drops startup file

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

Tasks