General

  • Target

    sol3nia.zip

  • Size

    200KB

  • Sample

    220624-zvqkfahdc4

  • MD5

    e87a05b109d51201681aef116688158d

  • SHA1

    07d7f7002ce471aa6b30e5023c264fb92c6c96fd

  • SHA256

    3817720772f336e0a1b850512fcad23d31ccb3099eb46af82bf98328895af665

  • SHA512

    b0139dfe0c9ee7297c879a512415907e1e7afb1056af46ab2e088884824fe5a70150da91b37a68c050dafd3da0f6b4b7409eecb0b75160fada27491bc8b9c7ec

Malware Config

Extracted

Family

icedid

Campaign

3585208491

C2

bredofenction.com

Targets

    • Target

      sol3nia/documents.lnk

    • Size

      2KB

    • MD5

      a70b3ec4c53ae4755365ac54d9ee05ec

    • SHA1

      2d991fc5b373182b537300b93329eaee13d2294e

    • SHA256

      2fe44042cfc6602b43204e38bcbc2773d1e4f87be6aa16073625bc1b33af6877

    • SHA512

      57de536a0b7c3ab74aa7480195341a3214162790869cfaede1917558fffb48023206eb68fb0a29d46c2eb720357f70bfe43a4d6a379f19a16f1ab34e28178050

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • suricata: ET MALWARE Win32/IcedID Request Cookie

      suricata: ET MALWARE Win32/IcedID Request Cookie

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Target

      sol3nia/sol3nia.dll

    • Size

      355KB

    • MD5

      88789ba7f00909005b2fe18ce83dbf58

    • SHA1

      08ffb813d1d7544380aa1b0e41703207451e1def

    • SHA256

      00dcc4642d488643856259cd3c576d9e24045b48783fc21ebdccd5fb4de66f8c

    • SHA512

      c78f79bd27a535e2efc1a133bfe92048dc3a77e9b9e6ef0aebab6403835fb585771c4da14493a1bf81a72e0f8340a5db81964e8852b4a3e8d0f9232985cd3478

    Score
    3/10

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks