General

  • Target

    nckcn-invoice-09.26.22.doc

  • Size

    866KB

  • Sample

    220926-wkqwnsbeh8

  • MD5

    d7ea47bbb034c9490a465863e8bb4b04

  • SHA1

    b3a9e5e6e12c5a59b8bd3d3323a497661d79e783

  • SHA256

    6cf4b6897928f8630040e5cb5db66fc6b979be1d3b8849986db9f0ac5bef1b84

  • SHA512

    bd9dd7666d332d25aecf50a90325208b4aa5546c5babbc6ce29fd518f0107d5614ca7d346c9603e3bbc62973abf0cbebd5fdb77a5517a0fe874e883a4b9a4463

  • SSDEEP

    12288:EZk9KVE9j2y+1JbeQbntrws6/GYzw6OFokpXfiiGef/DE54gb9orp/G7obL/PXSE:vKV2jUeQRI5wPN/AZb9oBGsnPXSYqaiy

Malware Config

Extracted

Family

icedid

Campaign

742081363

Extracted

Family

icedid

Campaign

742081363

C2

scainznorka.com

Targets

    • Target

      nckcn-invoice-09.26.22.doc

    • Size

      866KB

    • MD5

      d7ea47bbb034c9490a465863e8bb4b04

    • SHA1

      b3a9e5e6e12c5a59b8bd3d3323a497661d79e783

    • SHA256

      6cf4b6897928f8630040e5cb5db66fc6b979be1d3b8849986db9f0ac5bef1b84

    • SHA512

      bd9dd7666d332d25aecf50a90325208b4aa5546c5babbc6ce29fd518f0107d5614ca7d346c9603e3bbc62973abf0cbebd5fdb77a5517a0fe874e883a4b9a4463

    • SSDEEP

      12288:EZk9KVE9j2y+1JbeQbntrws6/GYzw6OFokpXfiiGef/DE54gb9orp/G7obL/PXSE:vKV2jUeQRI5wPN/AZb9oBGsnPXSYqaiy

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks