General

  • Target

    Setup_Win_09-12-2022_19-18-09.msi

  • Size

    824KB

  • Sample

    221209-zwdbhahb51

  • MD5

    0353ee6b786fc95a51d4c60d9c5486e2

  • SHA1

    30a34141c94e3f82da655582e6dae4bf2028936c

  • SHA256

    3d29a16fbc3ae7400fa96d9161defa473fcd2fd82c24929c8254824d50dead6b

  • SHA512

    4db04fc840669fd7c3f65da63674cb2516f92b12c9b2f4552cbc354af7f8ff8b3f3b7336301f203ccf39775f01cb9399d99d7213ba867aa19a3b6016a8ed8baa

  • SSDEEP

    24576:EHL0l9mTn3Tp9Lold0aID/kJAHCxWPXoPcTPbgrQlRNKIg8gx:Er0la3kd0oxWPXoPcTPbgrQlRNKIg8g

Malware Config

Extracted

Family

icedid

Campaign

1178326404

C2

broskabrwaf.com

Targets

    • Target

      Setup_Win_09-12-2022_19-18-09.msi

    • Size

      824KB

    • MD5

      0353ee6b786fc95a51d4c60d9c5486e2

    • SHA1

      30a34141c94e3f82da655582e6dae4bf2028936c

    • SHA256

      3d29a16fbc3ae7400fa96d9161defa473fcd2fd82c24929c8254824d50dead6b

    • SHA512

      4db04fc840669fd7c3f65da63674cb2516f92b12c9b2f4552cbc354af7f8ff8b3f3b7336301f203ccf39775f01cb9399d99d7213ba867aa19a3b6016a8ed8baa

    • SSDEEP

      24576:EHL0l9mTn3Tp9Lold0aID/kJAHCxWPXoPcTPbgrQlRNKIg8gx:Er0la3kd0oxWPXoPcTPbgrQlRNKIg8g

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Blocklisted process makes network request

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Tasks