General

  • Target

    r7kom.dll.zip

  • Size

    255KB

  • Sample

    220628-2f1g7scghp

  • MD5

    c4e436066fca1641c35fb092ab480f1f

  • SHA1

    e638f25be9e7a48e01c1b206abf3499f7941f553

  • SHA256

    1382817dc35e2ec6fb0734191a2144e974ce29166e506760976342ef0f38f8bf

  • SHA512

    b906f7b91e73859413ae0a87105259ffe009db41a5ae337740670f1f01b92d15724522115391b6f6dc81850e1798b5b06df6ae47b9b48340d09d771b7a71e257

Malware Config

Extracted

Family

icedid

Campaign

3568430872

C2

alionavon.com

Targets

    • Target

      r7kom.dll/documents.lnk

    • Size

      2KB

    • MD5

      ce783276c0618e3197fb2d3f51ae5790

    • SHA1

      f42e8af4f540c3e6b6a77a8b272f976fc7d44b1d

    • SHA256

      bb1fe6256cc9fc42bd74632871700af5f8663fe954a53378298b35c1f187f16b

    • SHA512

      99485a9f6a7ab134a162c3a7de48284d76f946d877ac718899ec5c54fc3b00f3cc26070742993fbb823f200c6bfb7ebf98ab83be5881a7595f297a6773a5f05f

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • suricata: ET MALWARE Win32/IcedID Request Cookie

      suricata: ET MALWARE Win32/IcedID Request Cookie

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Target

      r7kom.dll/r7kom.dll

    • Size

      450KB

    • MD5

      fdf40a208c17de2500e9a3a9aaccb5db

    • SHA1

      9e86a5c1e94e561da0ca51d505fc899fb2c27635

    • SHA256

      973bcb320032e9a12faee2971c15ec8c2c52dcf095699dc705a1d22118e58a18

    • SHA512

      bd5c76d1526788dd8c8bae4a6273595d0817e4e3e1d725a04e250549194624465ec65967390830e17bec5b7ef88ccb96e61474852b8f25e01e704f3964b91197

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • suricata: ET MALWARE Win32/IcedID Request Cookie

      suricata: ET MALWARE Win32/IcedID Request Cookie

    • Blocklisted process makes network request

MITRE ATT&CK Enterprise v6

Tasks