General

  • Target

    irpinc doc 09.26.2022.doc

  • Size

    866KB

  • Sample

    220926-v7p28abec2

  • MD5

    cc0bfeb8de5ac64632ad639d8d31a9c0

  • SHA1

    0cb08482da4b7789ac12d38c17dd287402420510

  • SHA256

    ebf4a084e6d4a5f9799da0d09a670ed79107193f35907a103f339471d65a9125

  • SHA512

    6c9557c70497f811554804845c33342c58e7fecbd08042b6276550773636e6afb414b88a51d59476b5d01fdbcc936cbc354ff917ac08815af817712b22ed6b49

  • SSDEEP

    12288:JhVE9j2y+1JbeQbntrws6/GYzw6OFokpXfiiGef/DEJA10y6x1Gc2rvOxtUlB2:JhV2jUeQRI5wPN/lXW5

Malware Config

Extracted

Family

icedid

Campaign

742081363

Extracted

Family

icedid

Campaign

742081363

C2

scainznorka.com

Targets

    • Target

      irpinc doc 09.26.2022.doc

    • Size

      866KB

    • MD5

      cc0bfeb8de5ac64632ad639d8d31a9c0

    • SHA1

      0cb08482da4b7789ac12d38c17dd287402420510

    • SHA256

      ebf4a084e6d4a5f9799da0d09a670ed79107193f35907a103f339471d65a9125

    • SHA512

      6c9557c70497f811554804845c33342c58e7fecbd08042b6276550773636e6afb414b88a51d59476b5d01fdbcc936cbc354ff917ac08815af817712b22ed6b49

    • SSDEEP

      12288:JhVE9j2y+1JbeQbntrws6/GYzw6OFokpXfiiGef/DEJA10y6x1Gc2rvOxtUlB2:JhV2jUeQRI5wPN/lXW5

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks