General

  • Target

    Invoice_187_document_09-06-22_unpaid.iso

  • Size

    1.5MB

  • Sample

    220928-whze2ahhbl

  • MD5

    80fbc2f5676b55ff35a1c1452317558f

  • SHA1

    b2783752c98008b2a0fba3a747d59805a58ae8af

  • SHA256

    df267b09f93920c5dd33cbd6094df03ca41a5d7d92a450460a667a7b3b0a955b

  • SHA512

    31df67d1081a0fa6995cfe44279cfa951dd9b7b2c586a9128c8a39a71cdd0e6926cefec3227db7a0f304a89fddda9b080a3806043ea30eea78ec9cb838a36f71

  • SSDEEP

    1536:FKpnyYaJ1qQDhH1kl8UyZYBlOduSzALTsRBuTHRT7VX5CHj6DYNzH57jT:wlyYCVrGBlOdl8LTAedX5CHjhp

Malware Config

Extracted

Family

icedid

Campaign

2211825656

C2

academfleedalas.com

Targets

    • Target

      Invoice_187_document_09-06-22_unpaid.iso

    • Size

      1.5MB

    • MD5

      80fbc2f5676b55ff35a1c1452317558f

    • SHA1

      b2783752c98008b2a0fba3a747d59805a58ae8af

    • SHA256

      df267b09f93920c5dd33cbd6094df03ca41a5d7d92a450460a667a7b3b0a955b

    • SHA512

      31df67d1081a0fa6995cfe44279cfa951dd9b7b2c586a9128c8a39a71cdd0e6926cefec3227db7a0f304a89fddda9b080a3806043ea30eea78ec9cb838a36f71

    • SSDEEP

      1536:FKpnyYaJ1qQDhH1kl8UyZYBlOduSzALTsRBuTHRT7VX5CHj6DYNzH57jT:wlyYCVrGBlOdl8LTAedX5CHjhp

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Blocklisted process makes network request

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Tasks