General

  • Target

    9235FF.html

  • Size

    405KB

  • Sample

    221121-rec1eacg45

  • MD5

    b5ccacd954b82f4b03c2d081a3a6a950

  • SHA1

    6e9cebca8a89fde23fec005c2f0a02be50f77dcc

  • SHA256

    6218e17d8965490f2c4cff15cf6e5efc54073212d089c3bb3962aed3fe22673c

  • SHA512

    b8a79726e3f339f95713832c5e7ab6be5e89094afb7999cc024352d3e15177e9be23ece7a6fe3cada934f9c7005f046c45d03acb87ae889e888efd8a31d2ffbd

  • SSDEEP

    6144:RYjRCBwC8pIy/5rDm/KZXoWw1jDpMIxb8hEc/npjhfhaSUjtIHZAtkHzOUYsA:RYjpXI6OifE1ApRj/aSqIH9Yn

Malware Config

Extracted

Family

icedid

Campaign

3822462527

C2

sciiultaelinoza.com

Targets

    • Target

      9235FF.html

    • Size

      405KB

    • MD5

      b5ccacd954b82f4b03c2d081a3a6a950

    • SHA1

      6e9cebca8a89fde23fec005c2f0a02be50f77dcc

    • SHA256

      6218e17d8965490f2c4cff15cf6e5efc54073212d089c3bb3962aed3fe22673c

    • SHA512

      b8a79726e3f339f95713832c5e7ab6be5e89094afb7999cc024352d3e15177e9be23ece7a6fe3cada934f9c7005f046c45d03acb87ae889e888efd8a31d2ffbd

    • SSDEEP

      6144:RYjRCBwC8pIy/5rDm/KZXoWw1jDpMIxb8hEc/npjhfhaSUjtIHZAtkHzOUYsA:RYjpXI6OifE1ApRj/aSqIH9Yn

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

4
T1012

System Information Discovery

5
T1082

Peripheral Device Discovery

2
T1120

Tasks