General

  • Target

    99011744097f00273285be391363bf68107fcb70e26734aab9158d6ce41b5553

  • Size

    31KB

  • Sample

    220114-q9el2sgef9

  • MD5

    5bdb898d0d1e4d3bee01baa1ab3dd449

  • SHA1

    1d036fb9e1d68ee39aa9bd5f74024defd7fdb431

  • SHA256

    6709873344986efc5fcd6b15f9b9373cc2e848a14a9d72f9e43cd53365c4c58c

  • SHA512

    71d4523b6cf35be60f5ec49fdf2355a3de4fcbc0bfd5a032cf0f244f5833c92b7dd32ac667e6de00b50df835c5ee7f5549a44f0ca62a94a799a16600c75b84f8

Malware Config

Extracted

Family

icedid

Campaign

497724135

C2

ovedfromasi.top

Targets

    • Target

      99011744097f00273285be391363bf68107fcb70e26734aab9158d6ce41b5553

    • Size

      70KB

    • MD5

      ad3cee699e138a4adda5ccdcfc48a58a

    • SHA1

      129acb764ef35193601cb834ca8d158053453f70

    • SHA256

      99011744097f00273285be391363bf68107fcb70e26734aab9158d6ce41b5553

    • SHA512

      2d976fb680342cbbc2389acc346cc82e2ec1d93b285c276ba0eacf89cc9d1b3ae18b722f667a6d792caa97a964819d99e114d088ab7ecd461f5b687898ef6854

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks