General

  • Target

    idoweddingcarsnifile12.23.2022.docm

  • Size

    1.3MB

  • Sample

    221224-wlxevaad33

  • MD5

    4f1f3962f51767cb687e21caa52ec86d

  • SHA1

    0886d9a017d527fca5d347a05f1ebd9006160846

  • SHA256

    a531fa89547828c68554b4a358cb4eaa21198e9b1fcd8efcbbfa5bbf295217ec

  • SHA512

    e1c3419bfd0c4fa57b327c2ccc547f6622a586842189e72788d3c6b0515a81812f45170393b1e445b1b3cca66127d74a1fb8cf1dbcaee8ec8972379c1bae57c9

  • SSDEEP

    24576:/CpJmLOgHWi8bj11H2w5inpF7sONo/qiy7L9pvRD8G7EzqHm+BmcS:/CpJmgf3zliFpp/KqG+y

Malware Config

Extracted

Family

icedid

Campaign

1212497363

C2

trbiriumpa.com

Targets

    • Target

      idoweddingcarsnifile12.23.2022.docm

    • Size

      1.3MB

    • MD5

      4f1f3962f51767cb687e21caa52ec86d

    • SHA1

      0886d9a017d527fca5d347a05f1ebd9006160846

    • SHA256

      a531fa89547828c68554b4a358cb4eaa21198e9b1fcd8efcbbfa5bbf295217ec

    • SHA512

      e1c3419bfd0c4fa57b327c2ccc547f6622a586842189e72788d3c6b0515a81812f45170393b1e445b1b3cca66127d74a1fb8cf1dbcaee8ec8972379c1bae57c9

    • SSDEEP

      24576:/CpJmLOgHWi8bj11H2w5inpF7sONo/qiy7L9pvRD8G7EzqHm+BmcS:/CpJmgf3zliFpp/KqG+y

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks