General

  • Target

    sac3p.7z

  • Size

    222KB

  • Sample

    220630-xld4yaafc9

  • MD5

    1dffe2464ff57e37a483c713f5823039

  • SHA1

    02d35e456b553be3ba9906c395386a7ec0dacb97

  • SHA256

    eac5d2ad5965e0c2da630487b93ba8922202720234df6ec941af3da66b4239cb

  • SHA512

    9aa19fa0444cc713c04330953cd54c980c5999d95ce18d21c9b4c1d4af6eff9d72611643226606538bea2584f46a3c33248fc27c2e7107e54ea35e8876c82417

Malware Config

Extracted

Family

icedid

Campaign

3635541348

C2

piponareatna.com

Targets

    • Target

      sac3p.7z

    • Size

      222KB

    • MD5

      1dffe2464ff57e37a483c713f5823039

    • SHA1

      02d35e456b553be3ba9906c395386a7ec0dacb97

    • SHA256

      eac5d2ad5965e0c2da630487b93ba8922202720234df6ec941af3da66b4239cb

    • SHA512

      9aa19fa0444cc713c04330953cd54c980c5999d95ce18d21c9b4c1d4af6eff9d72611643226606538bea2584f46a3c33248fc27c2e7107e54ea35e8876c82417

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • suricata: ET MALWARE Win32/IcedID Request Cookie

      suricata: ET MALWARE Win32/IcedID Request Cookie

    • Blocklisted process makes network request

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks