General

  • Target

    buyipc-document-09.28.doc

  • Size

    866KB

  • Sample

    220928-sdggwahdcj

  • MD5

    7ebb1b1f88422f8c861d986df6a26aee

  • SHA1

    fc1be107b21ab180a799df0402d5b4668e7fc3f2

  • SHA256

    0296a52b9f9d974354ff716eed586ac71e2406611dc9013081846c90c05344c9

  • SHA512

    963cff94f2f5a48fc51b5e540b1a9faac1964a7ae7ed42ff688e94e1cdbdbb25b3a59b436dfba80cd8343eee75a10ff636baf39ddcdb27b6d54b5ca2da9e4982

  • SSDEEP

    12288:CiJtVE9j2y+1JbeQbntrws6/GYzw6OFokpXfiiGef/DESHNxkp/G7obR99d5Xi+:CiPV2jUeQRI5wPN/tHuGsd9Bi+

Malware Config

Extracted

Family

icedid

Campaign

742081363

Extracted

Family

icedid

Campaign

742081363

C2

scainznorka.com

Targets

    • Target

      buyipc-document-09.28.doc

    • Size

      866KB

    • MD5

      7ebb1b1f88422f8c861d986df6a26aee

    • SHA1

      fc1be107b21ab180a799df0402d5b4668e7fc3f2

    • SHA256

      0296a52b9f9d974354ff716eed586ac71e2406611dc9013081846c90c05344c9

    • SHA512

      963cff94f2f5a48fc51b5e540b1a9faac1964a7ae7ed42ff688e94e1cdbdbb25b3a59b436dfba80cd8343eee75a10ff636baf39ddcdb27b6d54b5ca2da9e4982

    • SSDEEP

      12288:CiJtVE9j2y+1JbeQbntrws6/GYzw6OFokpXfiiGef/DESHNxkp/G7obR99d5Xi+:CiPV2jUeQRI5wPN/tHuGsd9Bi+

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks