General

  • Target

    Setup_Win_14-12-2022_18-36-29.msi

  • Size

    1.9MB

  • Sample

    221219-p2hs3afa44

  • MD5

    483a92951b440f2212fbfba38174d8a4

  • SHA1

    914b9a827b1937935681a033b1c32a2df97a4874

  • SHA256

    63a7d98369925d6e98994cdb5937bd896506665be9f80dc55de7eb6df00f7607

  • SHA512

    336d65a516d8503ec939cb52d186b42d1dc41abc253ac85262bd251f4c63f81fa78d8f48122e608c91ec7f6cf43db1daf87c9c26f6636fa6410d10541018a93b

  • SSDEEP

    49152:Jr0QHD5a4/7yGe8EsuRMEl73hXNGzchfzYZppUQ:Jr08MuLshh

Malware Config

Extracted

Family

icedid

Campaign

1002085315

C2

klepdrafooip.com

Targets

    • Target

      Setup_Win_14-12-2022_18-36-29.msi

    • Size

      1.9MB

    • MD5

      483a92951b440f2212fbfba38174d8a4

    • SHA1

      914b9a827b1937935681a033b1c32a2df97a4874

    • SHA256

      63a7d98369925d6e98994cdb5937bd896506665be9f80dc55de7eb6df00f7607

    • SHA512

      336d65a516d8503ec939cb52d186b42d1dc41abc253ac85262bd251f4c63f81fa78d8f48122e608c91ec7f6cf43db1daf87c9c26f6636fa6410d10541018a93b

    • SSDEEP

      49152:Jr0QHD5a4/7yGe8EsuRMEl73hXNGzchfzYZppUQ:Jr08MuLshh

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Peripheral Device Discovery

2
T1120

Tasks