General

  • Target

    butler-bremer-doc-08.11.doc

  • Size

    2.3MB

  • Sample

    220812-rtlwvsgeg4

  • MD5

    dbfecdc774a16bcaa3e8f1bce58f3ba2

  • SHA1

    9e67bac7c0db1f2f1db497beec832e1da67828ad

  • SHA256

    9040e1fcc5a51eb597103870c98ca41f51a1bf8dd5e05eac180a4424e16ac82f

  • SHA512

    b13f35bbdab07a29dae2944d5463ba38f01195022130c158a356031bd81863a5b15889d784457dadfcd703a423395709bed9fec392f3c74a32c4a4ce94706a32

Malware Config

Extracted

Family

icedid

Campaign

3570055661

Targets

    • Target

      butler-bremer-doc-08.11.doc

    • Size

      2.3MB

    • MD5

      dbfecdc774a16bcaa3e8f1bce58f3ba2

    • SHA1

      9e67bac7c0db1f2f1db497beec832e1da67828ad

    • SHA256

      9040e1fcc5a51eb597103870c98ca41f51a1bf8dd5e05eac180a4424e16ac82f

    • SHA512

      b13f35bbdab07a29dae2944d5463ba38f01195022130c158a356031bd81863a5b15889d784457dadfcd703a423395709bed9fec392f3c74a32c4a4ce94706a32

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks