General

  • Target

    nckcn-document-09.26.22.doc

  • Size

    865KB

  • Sample

    220926-v1eynsbea2

  • MD5

    3a885f1ec285d39dec2265905553a794

  • SHA1

    b2a3efe01e29b0156e195266cb8c156c234fee7f

  • SHA256

    a586f7e99af6232f33d3b7971f4c3107c9f45d086e18a29314c082b84d332d34

  • SHA512

    2a9db0cda300345d07f1c944c3aa6cb9564c694826a4b34c1242c91dd98a60d8474b9a2402e5cff8b844e47bfe9e1d3365b20a41e31dc2538e3c4b23d389bb87

  • SSDEEP

    12288:e7D1QZVE9j2y+1JbeQbntrws6/GYzw6OFokpXfiiGef/DEnJASz5I9f8h6dw:CD1IV2jUeQRI5wPN/g2e5W8h5

Malware Config

Extracted

Family

icedid

Campaign

742081363

Extracted

Family

icedid

Campaign

742081363

C2

scainznorka.com

Targets

    • Target

      nckcn-document-09.26.22.doc

    • Size

      865KB

    • MD5

      3a885f1ec285d39dec2265905553a794

    • SHA1

      b2a3efe01e29b0156e195266cb8c156c234fee7f

    • SHA256

      a586f7e99af6232f33d3b7971f4c3107c9f45d086e18a29314c082b84d332d34

    • SHA512

      2a9db0cda300345d07f1c944c3aa6cb9564c694826a4b34c1242c91dd98a60d8474b9a2402e5cff8b844e47bfe9e1d3365b20a41e31dc2538e3c4b23d389bb87

    • SSDEEP

      12288:e7D1QZVE9j2y+1JbeQbntrws6/GYzw6OFokpXfiiGef/DEnJASz5I9f8h6dw:CD1IV2jUeQRI5wPN/g2e5W8h5

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks