General

  • Target

    mvsdocument09.26.2022.doc

  • Size

    866KB

  • Sample

    220926-v3pwnabea8

  • MD5

    b48acfc1e413b37d29e7284e4dc059f4

  • SHA1

    0518c18f78faf9e97be202a9c530f9725c389163

  • SHA256

    807fb8634a8e1fea7d7927dd6b00a351e51b8533009d76184a930f41ebcbcf49

  • SHA512

    caf3c65a764476b014c028713e4ed2b5642d762554592320c660d3a43a62535ba5806e3e61587b91b91d67123d59c233f48af0a4ae3a077d02d42ac19c9bb003

  • SSDEEP

    12288:TJVE9j2y+1JbeQbntrws6/GYzw6OFokpXfiiGef/DESaYjfH9lvYz9Q6d6:tV2jUeQRI5wPN//a0fHAz9QX

Malware Config

Extracted

Family

icedid

Campaign

742081363

Extracted

Family

icedid

Campaign

742081363

C2

scainznorka.com

Targets

    • Target

      mvsdocument09.26.2022.doc

    • Size

      866KB

    • MD5

      b48acfc1e413b37d29e7284e4dc059f4

    • SHA1

      0518c18f78faf9e97be202a9c530f9725c389163

    • SHA256

      807fb8634a8e1fea7d7927dd6b00a351e51b8533009d76184a930f41ebcbcf49

    • SHA512

      caf3c65a764476b014c028713e4ed2b5642d762554592320c660d3a43a62535ba5806e3e61587b91b91d67123d59c233f48af0a4ae3a077d02d42ac19c9bb003

    • SSDEEP

      12288:TJVE9j2y+1JbeQbntrws6/GYzw6OFokpXfiiGef/DESaYjfH9lvYz9Q6d6:tV2jUeQRI5wPN//a0fHAz9QX

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Loads dropped DLL

MITRE ATT&CK Enterprise v6

Tasks