General

  • Target

    Document_45_Dec1.html

  • Size

    221KB

  • Sample

    221215-e5gp3aef6w

  • MD5

    6c130bf0bf8c70d5fd04418d005aabf1

  • SHA1

    9e5d2b15c11fd7d01de0cf5820c1d701b58a4704

  • SHA256

    a2948b43f53a5cb46d59e85563528d4b33015170453ad1648b0578a9ce5b913e

  • SHA512

    0135e266ce4a3bafd30f99bc0117a51d538e4b92c4f5624b2eef4e7fb55148232ee0ff3a2b56fbe2d2cd582713344da03c615d58f567faa710d1a9ca33ba3bb4

  • SSDEEP

    6144:V1oT3/qcQLScAEsZieCSt4Sem3N/DkSf3Yx1VJSxt+ooYu7k:VwPjQWcRsB4oAK3Yx3JSxcYb

Malware Config

Extracted

Family

icedid

Campaign

2271535685

C2

babysoftletirs.com

Targets

    • Target

      Document_45_Dec1.html

    • Size

      221KB

    • MD5

      6c130bf0bf8c70d5fd04418d005aabf1

    • SHA1

      9e5d2b15c11fd7d01de0cf5820c1d701b58a4704

    • SHA256

      a2948b43f53a5cb46d59e85563528d4b33015170453ad1648b0578a9ce5b913e

    • SHA512

      0135e266ce4a3bafd30f99bc0117a51d538e4b92c4f5624b2eef4e7fb55148232ee0ff3a2b56fbe2d2cd582713344da03c615d58f567faa710d1a9ca33ba3bb4

    • SSDEEP

      6144:V1oT3/qcQLScAEsZieCSt4Sem3N/DkSf3Yx1VJSxt+ooYu7k:VwPjQWcRsB4oAK3Yx3JSxcYb

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

3
T1012

Peripheral Device Discovery

2
T1120

System Information Discovery

3
T1082

Tasks