General

  • Target

    lvcta,file,09.26.22.doc

  • Size

    867KB

  • Sample

    220928-ktwbzafdg8

  • MD5

    dc03ee5b15e97ed0d3001a3578fd5e08

  • SHA1

    f27e7612b9f7beca404d46b495e8f7414644cea5

  • SHA256

    c74ee774e5d19e826097829a93d8dbb2a5900c21b0d44d26a001ba55dc272dc0

  • SHA512

    b184cd3eed97300d3694fbaf1616ea4a0dd98e43a7f622fcef048e7b29cb790c3ea1d2b6d0caa377e450c69b887c8f07af063a5008e3803c6036b73d19d2c489

  • SSDEEP

    12288:dJvVE9j2y+1JbeQbntrws6/GYzw6OFokpXfiiGef/DEkYesyQuuV+7/+TCD:dJvV2jUeQRI5wPN/nwVV+z+C

Malware Config

Extracted

Family

icedid

Campaign

742081363

Extracted

Family

icedid

Campaign

742081363

C2

scainznorka.com

Targets

    • Target

      lvcta,file,09.26.22.doc

    • Size

      867KB

    • MD5

      dc03ee5b15e97ed0d3001a3578fd5e08

    • SHA1

      f27e7612b9f7beca404d46b495e8f7414644cea5

    • SHA256

      c74ee774e5d19e826097829a93d8dbb2a5900c21b0d44d26a001ba55dc272dc0

    • SHA512

      b184cd3eed97300d3694fbaf1616ea4a0dd98e43a7f622fcef048e7b29cb790c3ea1d2b6d0caa377e450c69b887c8f07af063a5008e3803c6036b73d19d2c489

    • SSDEEP

      12288:dJvVE9j2y+1JbeQbntrws6/GYzw6OFokpXfiiGef/DEkYesyQuuV+7/+TCD:dJvV2jUeQRI5wPN/nwVV+z+C

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks