General

  • Target

    jobeysdocument09.26.doc

  • Size

    866KB

  • Sample

    220926-wd1gjacffj

  • MD5

    6f8f03cdd01d74468bd130c6bf0026c8

  • SHA1

    867c63ddf9eb11d52ed37031619584b20950e0c0

  • SHA256

    212a3bd1d47d54ea3bc940531f8ca8047842970f87697f2766bcb443d6576ce2

  • SHA512

    870064a0228559f1bf469f3be8c35df3297b395ebc15fb5b75d9e649edaaf41b5d5d059a77ab600a93db89ffc92358e6d162ca56ef5004c54f84fd0300917fa9

  • SSDEEP

    12288:tVE9j2y+1JbeQbntrws6/GYzw6OFokpXfiiGef/DEdGenZn70NzNmWcx:tV2jUeQRI5wPN/1c01NmW4

Malware Config

Extracted

Family

icedid

Campaign

742081363

Extracted

Family

icedid

Campaign

742081363

C2

scainznorka.com

Targets

    • Target

      jobeysdocument09.26.doc

    • Size

      866KB

    • MD5

      6f8f03cdd01d74468bd130c6bf0026c8

    • SHA1

      867c63ddf9eb11d52ed37031619584b20950e0c0

    • SHA256

      212a3bd1d47d54ea3bc940531f8ca8047842970f87697f2766bcb443d6576ce2

    • SHA512

      870064a0228559f1bf469f3be8c35df3297b395ebc15fb5b75d9e649edaaf41b5d5d059a77ab600a93db89ffc92358e6d162ca56ef5004c54f84fd0300917fa9

    • SSDEEP

      12288:tVE9j2y+1JbeQbntrws6/GYzw6OFokpXfiiGef/DEdGenZn70NzNmWcx:tV2jUeQRI5wPN/1c01NmW4

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks