General

  • Target

    shawbiz invoice 12.23.docm

  • Size

    1.3MB

  • Sample

    221224-wlw43sde7t

  • MD5

    440b56bb35362c65c9b8fc64a119aa36

  • SHA1

    c73967db942b92ae2c78efd36be1595cd298bb99

  • SHA256

    646dcfd47d1e5426d9669777582923cf1e7c474f80bc86df282df04925ee80e9

  • SHA512

    35976e273aaf43683201bc00ea3efcf0f59f2ee76a3a25b5165268e18b9a51868005f9a69a07a1e28e998ce408fcd5f5e2e93ccbb4c6e8be35a487d159da32de

  • SSDEEP

    24576:/jpJmLOgHWi8bj11H2w5inpF7sONo/qiy7L9pvRDcG7EzqHm+BmcZ:/jpJmgf3zliFppfKqG+5

Malware Config

Extracted

Family

icedid

Campaign

1212497363

Extracted

Family

icedid

Campaign

1212497363

C2

trbiriumpa.com

Targets

    • Target

      shawbiz invoice 12.23.docm

    • Size

      1.3MB

    • MD5

      440b56bb35362c65c9b8fc64a119aa36

    • SHA1

      c73967db942b92ae2c78efd36be1595cd298bb99

    • SHA256

      646dcfd47d1e5426d9669777582923cf1e7c474f80bc86df282df04925ee80e9

    • SHA512

      35976e273aaf43683201bc00ea3efcf0f59f2ee76a3a25b5165268e18b9a51868005f9a69a07a1e28e998ce408fcd5f5e2e93ccbb4c6e8be35a487d159da32de

    • SSDEEP

      24576:/jpJmLOgHWi8bj11H2w5inpF7sONo/qiy7L9pvRDcG7EzqHm+BmcZ:/jpJmgf3zliFppfKqG+5

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks