General

  • Target

    _tmp_Unpaid_8217_Dec9.html

  • Size

    311KB

  • Sample

    221210-r1j1vaad2x

  • MD5

    04903994f360964bb648ca3af92ed95d

  • SHA1

    d3719a0544f04f1bb15c98207b81763d69808f57

  • SHA256

    b95cd7e4e787f3759442eeba86ca13d764392ebbd24902378067b553e9f63f7a

  • SHA512

    3b331f25c01570d2349fb174817d03d6477376b58232e185c1c509e8815d7465537e547133e3793a5ad8b250379b4b309e359f306b0050ee42eb736b9a70c926

  • SSDEEP

    6144:8ZoPBQWo8qlxRn6h34rOi6oBO9qylT3UaBKB8i+BtSem3N/DkSf3Yx1VJSxt+ooi:HpZobLn6hiOi6+OvJF8+BtoAK3Yx3JS/

Malware Config

Extracted

Family

icedid

Campaign

1268412609

C2

ewgahskoot.com

Targets

    • Target

      _tmp_Unpaid_8217_Dec9.html

    • Size

      311KB

    • MD5

      04903994f360964bb648ca3af92ed95d

    • SHA1

      d3719a0544f04f1bb15c98207b81763d69808f57

    • SHA256

      b95cd7e4e787f3759442eeba86ca13d764392ebbd24902378067b553e9f63f7a

    • SHA512

      3b331f25c01570d2349fb174817d03d6477376b58232e185c1c509e8815d7465537e547133e3793a5ad8b250379b4b309e359f306b0050ee42eb736b9a70c926

    • SSDEEP

      6144:8ZoPBQWo8qlxRn6h34rOi6oBO9qylT3UaBKB8i+BtSem3N/DkSf3Yx1VJSxt+ooi:HpZobLn6hiOi6+OvJF8+BtoAK3Yx3JS/

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

3
T1012

Peripheral Device Discovery

2
T1120

System Information Discovery

3
T1082

Tasks