General

  • Target

    kingwoodcable,file,09.26.2022.doc

  • Size

    866KB

  • Sample

    220926-wfrx6scffr

  • MD5

    8800ebee81ecaac20cd1a31d9b8ab872

  • SHA1

    c163d993c1d6c1fe9b158dee3a6ed9662f6c4bf2

  • SHA256

    da08cc0f50eedb128dcd8027450329fc5f8f51c81aa24d86c79789d278918f78

  • SHA512

    78093a891c1324b8211e926f18acc8bcb883cd0b458660b064fd908d2cf590fcd296dbb94acd431e516aed83f09677ffca2bea03d7b9eee0f4cb19c8de60f55c

  • SSDEEP

    12288:h5VE9j2y+1JbeQbntrws6/GYzw6OFokpXfiiGef/DEMHNx0Szvk9V6dUM:h5V2jUeQRI5wPN/NH3zM9VS

Malware Config

Extracted

Family

icedid

Campaign

742081363

Extracted

Family

icedid

Campaign

742081363

C2

scainznorka.com

Targets

    • Target

      kingwoodcable,file,09.26.2022.doc

    • Size

      866KB

    • MD5

      8800ebee81ecaac20cd1a31d9b8ab872

    • SHA1

      c163d993c1d6c1fe9b158dee3a6ed9662f6c4bf2

    • SHA256

      da08cc0f50eedb128dcd8027450329fc5f8f51c81aa24d86c79789d278918f78

    • SHA512

      78093a891c1324b8211e926f18acc8bcb883cd0b458660b064fd908d2cf590fcd296dbb94acd431e516aed83f09677ffca2bea03d7b9eee0f4cb19c8de60f55c

    • SSDEEP

      12288:h5VE9j2y+1JbeQbntrws6/GYzw6OFokpXfiiGef/DEMHNx0Szvk9V6dUM:h5V2jUeQRI5wPN/NH3zM9VS

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks