General

  • Target

    document 2.iso

  • Size

    2.2MB

  • Sample

    220623-gj96laefd5

  • MD5

    f00ee02812c8e68ff8e9e701c051fafe

  • SHA1

    7d0866e47cc51a09b3441805fb21a06a349048b8

  • SHA256

    7354552c28ad25c6c83e84f1ef7da0a8a53dc9ba8177416c1f4be229130505b5

  • SHA512

    8856fb7ea9cdc6d36062dfbd6165b1da9ad5c70e33dab6d4bab7bf785f788d6ebbd95e1488f44d98957f369053e9e0fa5095fcf6c95d808ac04142cbf9b1608b

Malware Config

Extracted

Family

icedid

Campaign

3433768635

C2

bredofenction.com

Targets

    • Target

      document 2.iso

    • Size

      2.2MB

    • MD5

      f00ee02812c8e68ff8e9e701c051fafe

    • SHA1

      7d0866e47cc51a09b3441805fb21a06a349048b8

    • SHA256

      7354552c28ad25c6c83e84f1ef7da0a8a53dc9ba8177416c1f4be229130505b5

    • SHA512

      8856fb7ea9cdc6d36062dfbd6165b1da9ad5c70e33dab6d4bab7bf785f788d6ebbd95e1488f44d98957f369053e9e0fa5095fcf6c95d808ac04142cbf9b1608b

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • suricata: ET MALWARE Win32/IcedID Request Cookie

      suricata: ET MALWARE Win32/IcedID Request Cookie

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Registers COM server for autorun

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks