General

  • Target

    Invoice-09-28#52_PDF.iso

  • Size

    2.1MB

  • Sample

    221004-zdtwjacfhp

  • MD5

    c252583500fd18ee46365a3cd53a44bf

  • SHA1

    6ba4c94b80ad0ef4703dabf1d20d1208c5921379

  • SHA256

    0fdaa635a9eaac9b44ef6ba78dc4887f87e87678ced73093139b75f0200714ee

  • SHA512

    cff5e0748ed5c1f027137cdb17c439c72e7e807ea15e8e89e032817727d0bc12866bf13d674a782e7637a5f2f39ea34960e77d25c9c1783c770d6d2a77943cb1

  • SSDEEP

    6144:8JyOH6HGSOHyxj84LoOjlMsfEfv8LBUNObzJHdQIa98HrKg8x/IXz:8JOGSgyoOhMX8hQQ

Malware Config

Extracted

Family

icedid

Campaign

2220668032

C2

alockajilly.com

Targets

    • Target

      Invoice-09-28#52_PDF.iso

    • Size

      2.1MB

    • MD5

      c252583500fd18ee46365a3cd53a44bf

    • SHA1

      6ba4c94b80ad0ef4703dabf1d20d1208c5921379

    • SHA256

      0fdaa635a9eaac9b44ef6ba78dc4887f87e87678ced73093139b75f0200714ee

    • SHA512

      cff5e0748ed5c1f027137cdb17c439c72e7e807ea15e8e89e032817727d0bc12866bf13d674a782e7637a5f2f39ea34960e77d25c9c1783c770d6d2a77943cb1

    • SSDEEP

      6144:8JyOH6HGSOHyxj84LoOjlMsfEfv8LBUNObzJHdQIa98HrKg8x/IXz:8JOGSgyoOhMX8hQQ

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Blocklisted process makes network request

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Tasks