General

  • Target

    Invoice_229_document_09-06-22_unpaid.iso

  • Size

    1.5MB

  • Sample

    220929-vqha2scdgq

  • MD5

    5744c592b0b2d7fce88afd43cd6bddfd

  • SHA1

    06598035fbe74bba86c248c087e9e7a70cbe51ac

  • SHA256

    55bdf10d6023e63ec3d16da09aaaa5f8a0c2e626ab95834655c42be2da1be279

  • SHA512

    0024ea3b218588ae0b26d9a1d59539541e70910db3e6edd1e817748be86f859df62dea580cf8dfd3ce680f28962ec17cb6deae1c11a6c5c55893e6519e338bca

  • SSDEEP

    1536:/H9WeOEkTdgUZNSe9iyMt22+Y8jddOnDfL3M5J8Q9u0P:v9zOECgTe9iyMt5GjdW7M5ZM

Malware Config

Extracted

Family

icedid

Campaign

2211825656

C2

academfleedalas.com

Targets

    • Target

      Invoice_229_document_09-06-22_unpaid.iso

    • Size

      1.5MB

    • MD5

      5744c592b0b2d7fce88afd43cd6bddfd

    • SHA1

      06598035fbe74bba86c248c087e9e7a70cbe51ac

    • SHA256

      55bdf10d6023e63ec3d16da09aaaa5f8a0c2e626ab95834655c42be2da1be279

    • SHA512

      0024ea3b218588ae0b26d9a1d59539541e70910db3e6edd1e817748be86f859df62dea580cf8dfd3ce680f28962ec17cb6deae1c11a6c5c55893e6519e338bca

    • SSDEEP

      1536:/H9WeOEkTdgUZNSe9iyMt22+Y8jddOnDfL3M5J8Q9u0P:v9zOECgTe9iyMt5GjdW7M5ZM

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Blocklisted process makes network request

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Tasks