General

  • Target

    nehp,file,09.26.2022.doc

  • Size

    865KB

  • Sample

    220926-ww2gjsbfd6

  • MD5

    c70608e32fa0841a26a477521ba26964

  • SHA1

    bde8feba267b31dbd39fa6437a63b57aca48925d

  • SHA256

    80388e408f4208e1ddd8cf42d39ec382fe085819c4431013aeb5e609c32bb014

  • SHA512

    0341a153c6372416495e32ee7ca94d26b176a295fbe1cea4627c085fb23aa840b6f705c8a52957092578a1fdbfc99d6c28f89222ee2c3786970663cc30121218

  • SSDEEP

    12288:lVE9j2y+1JbeQbntrws6/GYzw6OFokpXfiiGef/DEV+rAjDDK2HiFRpr2MmQ:lV2jUeQRI5wPN/vUHDKiaqMmQ

Malware Config

Extracted

Family

icedid

Campaign

742081363

Extracted

Family

icedid

Campaign

742081363

C2

scainznorka.com

Targets

    • Target

      nehp,file,09.26.2022.doc

    • Size

      865KB

    • MD5

      c70608e32fa0841a26a477521ba26964

    • SHA1

      bde8feba267b31dbd39fa6437a63b57aca48925d

    • SHA256

      80388e408f4208e1ddd8cf42d39ec382fe085819c4431013aeb5e609c32bb014

    • SHA512

      0341a153c6372416495e32ee7ca94d26b176a295fbe1cea4627c085fb23aa840b6f705c8a52957092578a1fdbfc99d6c28f89222ee2c3786970663cc30121218

    • SSDEEP

      12288:lVE9j2y+1JbeQbntrws6/GYzw6OFokpXfiiGef/DEV+rAjDDK2HiFRpr2MmQ:lV2jUeQRI5wPN/vUHDKiaqMmQ

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks