Resubmissions

19-12-2022 02:25

221219-cwd7gaea97 10

19-12-2022 01:00

221219-bctblsea42 1

General

  • Target

    ad0b597f-8472-47ba-acbc-3f1f230c4368.html

  • Size

    311KB

  • Sample

    221219-cwd7gaea97

  • MD5

    04b6f6cdda4411c45038f328824a9380

  • SHA1

    2cd6065d6b38c8f3be00dd0f69794840cb1cc1dd

  • SHA256

    e3ca823e3e4f5df33fcb5edb04843bdb44a81815935cf83be69e09e44019d419

  • SHA512

    602858c0abb0e6d27e41f88f3b8eab4e1fcc7f9e52721460f64f71b05a6ace8997ae718f5f53764e2d9c383b7ee78a4b5b0e090abcf0de9bc00d495e40df548c

  • SSDEEP

    6144:tvWj6cKrpS3b0M7wVY80a+PnHzjiWNANF0PtpRSem3N/DkSf3Yx1VJSxt+ooYuuH:t66cKrQdna+vHzjikAeTRoAK3Yx3JSx7

Malware Config

Extracted

Family

icedid

Campaign

1268412609

C2

ewgahskoot.com

Targets

    • Target

      ad0b597f-8472-47ba-acbc-3f1f230c4368.html

    • Size

      311KB

    • MD5

      04b6f6cdda4411c45038f328824a9380

    • SHA1

      2cd6065d6b38c8f3be00dd0f69794840cb1cc1dd

    • SHA256

      e3ca823e3e4f5df33fcb5edb04843bdb44a81815935cf83be69e09e44019d419

    • SHA512

      602858c0abb0e6d27e41f88f3b8eab4e1fcc7f9e52721460f64f71b05a6ace8997ae718f5f53764e2d9c383b7ee78a4b5b0e090abcf0de9bc00d495e40df548c

    • SSDEEP

      6144:tvWj6cKrpS3b0M7wVY80a+PnHzjiWNANF0PtpRSem3N/DkSf3Yx1VJSxt+ooYuuH:t66cKrQdna+vHzjikAeTRoAK3Yx3JSx7

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Blocklisted process makes network request

    • Loads dropped DLL

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

3
T1012

Peripheral Device Discovery

2
T1120

System Information Discovery

3
T1082

Tasks