General

  • Target

    SW-1186978918.xlsb

  • Size

    155KB

  • Sample

    220210-ldl9ssgfh3

  • MD5

    0d17b19ea324d2ae08a0473e98498bfc

  • SHA1

    2f11fa59b4d2c64863881e8084c15c89da09c190

  • SHA256

    1b6fc736726745e4d745f373d11ab661bd27db662a6e833b21678c193c06a88c

  • SHA512

    d58be72762e83d358330cf8bc7801665e37909f5c7f94fbf0eb6133096c831cdf543598f7ea15f98bfd877966967f0939b8a99b555f8591eeae312452f9affe4

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://peragumer.com/vdj39dyg3ref/1.dll

xlm40.dropper

http://peragumer.com/vdj39dyg3ref/2.dll

xlm40.dropper

http://peragumer.com/vdj39dyg3ref/3.dll

Extracted

Family

icedid

Campaign

3825802847

Targets

    • Target

      SW-1186978918.xlsb

    • Size

      155KB

    • MD5

      0d17b19ea324d2ae08a0473e98498bfc

    • SHA1

      2f11fa59b4d2c64863881e8084c15c89da09c190

    • SHA256

      1b6fc736726745e4d745f373d11ab661bd27db662a6e833b21678c193c06a88c

    • SHA512

      d58be72762e83d358330cf8bc7801665e37909f5c7f94fbf0eb6133096c831cdf543598f7ea15f98bfd877966967f0939b8a99b555f8591eeae312452f9affe4

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Downloads MZ/PE file

    • Loads dropped DLL

MITRE ATT&CK Enterprise v6

Tasks