General

  • Target

    mildjs.file.09.26.doc

  • Size

    866KB

  • Sample

    220926-ysmkbsbhe7

  • MD5

    7de7d68ac040e38455949527846f8064

  • SHA1

    6322e5b14a4d85b45365f0f6950868422e8e29ab

  • SHA256

    ebaa68738173a87e2dbde383c8879facc05def85da47be4e8be6fc369e7f232f

  • SHA512

    26903682f1a047ed1b81cbf09bcbb8fd322b266c3e1275d1fffe4e8b4deff9d8333ec4dabe66efe5364dc3ddc2cf1af5f2013fd282fe34bb76345b1803bfff82

  • SSDEEP

    12288:/XMVE9j2y+1JbeQbntrws6/GYzw6OFokpXfiiGef/DEnifnslvYX6htjos:UV2jUeQRI5wPN/VnBVs

Malware Config

Extracted

Family

icedid

Campaign

742081363

Extracted

Family

icedid

Campaign

742081363

C2

scainznorka.com

Targets

    • Target

      mildjs.file.09.26.doc

    • Size

      866KB

    • MD5

      7de7d68ac040e38455949527846f8064

    • SHA1

      6322e5b14a4d85b45365f0f6950868422e8e29ab

    • SHA256

      ebaa68738173a87e2dbde383c8879facc05def85da47be4e8be6fc369e7f232f

    • SHA512

      26903682f1a047ed1b81cbf09bcbb8fd322b266c3e1275d1fffe4e8b4deff9d8333ec4dabe66efe5364dc3ddc2cf1af5f2013fd282fe34bb76345b1803bfff82

    • SSDEEP

      12288:/XMVE9j2y+1JbeQbntrws6/GYzw6OFokpXfiiGef/DEnifnslvYX6htjos:UV2jUeQRI5wPN/VnBVs

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks