General

  • Target

    demoscan-130722.13580.iso

  • Size

    3.0MB

  • Sample

    220718-hpsn6sbcgn

  • MD5

    2d9500d6f660e5c951d4e1ea235a5535

  • SHA1

    979a45fb74b6303667efb7c94b7aacc5cf70b4d3

  • SHA256

    91052024d572fc07856b07fa42ff22c2ce7fdcce7c254b58a020a784f57dc76b

  • SHA512

    9bbf699863056c8c0c7f486f80c16119f65254a1014e3eaf2a1b3719a4ef95a3ae325b7968df6f21b96d08eed18aae1adb9c83d84ba63bad2ce8bf8c93baa0a2

Malware Config

Extracted

Family

icedid

Campaign

294489237

C2

alldogsedag.com

Targets

    • Target

      demoscan-130722.13580.png.lnk

    • Size

      1KB

    • MD5

      71bb9697cd8d44fb4c432f711cb3b225

    • SHA1

      c6bf80479d1a10ae40fff43f218e4d92cdad0ed5

    • SHA256

      3ae64b4841b7f0d1b26fd11d4cdc1a34fb43b87f29574b64e859c8e523fb136f

    • SHA512

      9a046b6eb47c4cea61f2c4896a13ef5c95051f28528b2140f8a00c44a2e72393b380234efad8c1498c8b04161a10958818043e601fe321fa051d708d8e0948cb

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • suricata: ET MALWARE Win32/IcedID Request Cookie

      suricata: ET MALWARE Win32/IcedID Request Cookie

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Target

      x3PF2bet.dll

    • Size

      56KB

    • MD5

      a22d944073647592ddccee216aec42da

    • SHA1

      e56ecad86a793280b138502e106e10d201297485

    • SHA256

      5901205bf48cf2f3a05c96cb7bbd9bee5367d8c989936ce7b780b082ebd5a73d

    • SHA512

      61f0ec71dff49a299a152e7f95496e07bee46a63e069f61e186c2ae30a5d7637a52a751d4499c5df9e49902e0ed7c881a860b6f5d85e5cfc684bfbbfda6ef05b

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • suricata: ET MALWARE Win32/IcedID Request Cookie

      suricata: ET MALWARE Win32/IcedID Request Cookie

    • Blocklisted process makes network request

MITRE ATT&CK Enterprise v6

Tasks