General

  • Target

    e472b696ec89d0d6215c0d21304408a2b9a1257727c971279103dda68738592a.rar

  • Size

    478KB

  • Sample

    220517-c38pnaghgl

  • MD5

    b19a5078e63c53ff46a62085ffb0a1ae

  • SHA1

    4e88e784e12057dfd4c1adb4a2c384890a166f3c

  • SHA256

    92c6795bb0fd13a958ed3544db69ad07a0139c787c18625d48683fd861ebcaa9

  • SHA512

    fd505c8fd6bba67ebe484aeae79cd1628533c2775efad838062153eccc3a5393a0d465eff1a25cc125e5cca2956570d5406d43255d3f7bde283e5fdf80ff2c3f

Malware Config

Extracted

Family

icedid

Campaign

3084789471

C2

yolneanz.com

Targets

    • Target

      documents.lnk

    • Size

      1KB

    • MD5

      5dd2663a72c1114ef4257c69f07f7973

    • SHA1

      1891936886f9114c2af23fa13845fdc28cb98326

    • SHA256

      30705ee86a30f4373203d1be11715ba4bf5709bc277b369ea7d4f6b19d024279

    • SHA512

      a10c78a86c185e37bcd0afbdf68ef65b19c39d35d308b8535c23f0a205f2d32c0f41850080b759de628267357dd5fe0fca736d4de0111cda45bc92c0c040173f

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • suricata: ET MALWARE Win32/IcedID Request Cookie

      suricata: ET MALWARE Win32/IcedID Request Cookie

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

MITRE ATT&CK Enterprise v6

Tasks