General

  • Target

    meekadesigns doc 09.26.22.doc

  • Size

    865KB

  • Sample

    220926-wmg2jscgaj

  • MD5

    954807b4560799b78739a0c930e81079

  • SHA1

    92c18b53713048e8cb460f6d064aff015e62d87b

  • SHA256

    e3887579686027793f881b42efdc407dc6c928a950e67fdd77ea56e2345b0bb9

  • SHA512

    8df8841808328e93918386f2358b92b604594738b025900766f2365649ad2d9030160512255cb0abdfbe832d6ec66fcb3e22c29a98fa5d47cba9a8b39fd938ba

  • SSDEEP

    12288:0LjVE9j2y+1JbeQbntrws6/GYzw6OFokpXfiiGef/DEMaG9OgdQs6kFtBhYc4H/o:0vV2jUeQRI5wPN/hOfsnFtB9Yca8

Malware Config

Extracted

Family

icedid

Campaign

742081363

Extracted

Family

icedid

Campaign

742081363

C2

scainznorka.com

Targets

    • Target

      meekadesigns doc 09.26.22.doc

    • Size

      865KB

    • MD5

      954807b4560799b78739a0c930e81079

    • SHA1

      92c18b53713048e8cb460f6d064aff015e62d87b

    • SHA256

      e3887579686027793f881b42efdc407dc6c928a950e67fdd77ea56e2345b0bb9

    • SHA512

      8df8841808328e93918386f2358b92b604594738b025900766f2365649ad2d9030160512255cb0abdfbe832d6ec66fcb3e22c29a98fa5d47cba9a8b39fd938ba

    • SSDEEP

      12288:0LjVE9j2y+1JbeQbntrws6/GYzw6OFokpXfiiGef/DEMaG9OgdQs6kFtBhYc4H/o:0vV2jUeQRI5wPN/hOfsnFtB9Yca8

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks