General

  • Target

    itechmotion.invoice.09.26.2022.doc

  • Size

    866KB

  • Sample

    220926-wfrx6scffp

  • MD5

    10a5d966940ea1c905706be520951f93

  • SHA1

    2193b386d1ec69067ab48ac97321fa32f1bba5f8

  • SHA256

    213d3eb70ec15b26498f49724494a0d342d7af7fd491c375a0ae056b3689f77a

  • SHA512

    e0646ca08bd99fbd195674acb30f89a7a05f74b47ba9367087d9f8fd9a90a26964c08bacbe91bf3c422c163c3af16b90d16bde70c537a5fa8f760958a5aa075a

  • SSDEEP

    12288:XVE9j2y+1JbeQbntrws6/GYzw6OFokpXfiiGef/DEvh6lHxuNzNVb:XV2jUeQRI5wPN/0IlE1NVb

Malware Config

Extracted

Family

icedid

Campaign

742081363

Extracted

Family

icedid

Campaign

742081363

C2

scainznorka.com

Targets

    • Target

      itechmotion.invoice.09.26.2022.doc

    • Size

      866KB

    • MD5

      10a5d966940ea1c905706be520951f93

    • SHA1

      2193b386d1ec69067ab48ac97321fa32f1bba5f8

    • SHA256

      213d3eb70ec15b26498f49724494a0d342d7af7fd491c375a0ae056b3689f77a

    • SHA512

      e0646ca08bd99fbd195674acb30f89a7a05f74b47ba9367087d9f8fd9a90a26964c08bacbe91bf3c422c163c3af16b90d16bde70c537a5fa8f760958a5aa075a

    • SSDEEP

      12288:XVE9j2y+1JbeQbntrws6/GYzw6OFokpXfiiGef/DEvh6lHxuNzNVb:XV2jUeQRI5wPN/0IlE1NVb

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks