General

  • Target

    letsachievehealth.doc.09.26.22.doc

  • Size

    867KB

  • Sample

    220926-wj7g2acfhk

  • MD5

    2f6c56f5be2405f2cd528e0629958810

  • SHA1

    a11e8627742ea4a5e60d21fa62ab3b442adb51c5

  • SHA256

    284250c6ed4cce821821c36bcb7782d27c3a095fd24fb761ad4d86bb454e0af3

  • SHA512

    dbcee7fc83801418a79057f1bb14aa9a4744fec43a34b61d2ca5eb548f32a7272d8a44d566f22b7a84b11fa60abf01d1a0831b75f25678c1535faf074106a817

  • SSDEEP

    12288:uVE9j2y+1JbeQbntrws6/GYzw6OFokpXfiiGef/DE7+uMesywD/XA67Gr:uV2jUeQRI5wPN/UlQD/w6q

Malware Config

Extracted

Family

icedid

Campaign

742081363

Extracted

Family

icedid

Campaign

742081363

C2

scainznorka.com

Targets

    • Target

      letsachievehealth.doc.09.26.22.doc

    • Size

      867KB

    • MD5

      2f6c56f5be2405f2cd528e0629958810

    • SHA1

      a11e8627742ea4a5e60d21fa62ab3b442adb51c5

    • SHA256

      284250c6ed4cce821821c36bcb7782d27c3a095fd24fb761ad4d86bb454e0af3

    • SHA512

      dbcee7fc83801418a79057f1bb14aa9a4744fec43a34b61d2ca5eb548f32a7272d8a44d566f22b7a84b11fa60abf01d1a0831b75f25678c1535faf074106a817

    • SSDEEP

      12288:uVE9j2y+1JbeQbntrws6/GYzw6OFokpXfiiGef/DE7+uMesywD/XA67Gr:uV2jUeQRI5wPN/UlQD/w6q

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks