General

  • Target

    myfairpoint-file-09.26.doc

  • Size

    866KB

  • Sample

    220926-vmzqxsbdd6

  • MD5

    d26f2d21583aaa72c8e2545aac62257c

  • SHA1

    44da404bb478c2a6fa5c205a12a4cfb81b558f91

  • SHA256

    edc11aa4b1212f620cc1fc0c12d79dee23511467a7fd955e9afad88ed250e765

  • SHA512

    96fc32b295e50500786b33a4a9c796ece6e469907018641acfb66a4ee7d61ccc7fa26f4bd9caa61591cf56783b7dfc937696f9bdb4542b1f1e17fbdd86d64b0b

  • SSDEEP

    12288:FmdVE9j2y+1JbeQbntrws6/GYzw6OFokpXfiiGef/DEtv6UgJWjpruMms:8dV2jUeQRI5wPN/giUgAiMms

Malware Config

Extracted

Family

icedid

Campaign

742081363

Extracted

Family

icedid

Campaign

742081363

C2

scainznorka.com

Targets

    • Target

      myfairpoint-file-09.26.doc

    • Size

      866KB

    • MD5

      d26f2d21583aaa72c8e2545aac62257c

    • SHA1

      44da404bb478c2a6fa5c205a12a4cfb81b558f91

    • SHA256

      edc11aa4b1212f620cc1fc0c12d79dee23511467a7fd955e9afad88ed250e765

    • SHA512

      96fc32b295e50500786b33a4a9c796ece6e469907018641acfb66a4ee7d61ccc7fa26f4bd9caa61591cf56783b7dfc937696f9bdb4542b1f1e17fbdd86d64b0b

    • SSDEEP

      12288:FmdVE9j2y+1JbeQbntrws6/GYzw6OFokpXfiiGef/DEtv6UgJWjpruMms:8dV2jUeQRI5wPN/giUgAiMms

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks