General

  • Target

    iwdocument12.23.2022.docm

  • Size

    1.3MB

  • Sample

    221224-wlxevade7w

  • MD5

    655402ee5fbd4bdd9a6e08703bb3452e

  • SHA1

    8bbd519f46ebcdb6fbb3912fec5e36a03ce205bb

  • SHA256

    bd0512e03c8d40051d895de308e6e30c045470b54d47f1f71caea2675f01c468

  • SHA512

    36456bd7d7b1231a0c68f7ff285a0044a8fedf26170ad36e95b21f743adc4f04226fb6f0b3defd15cc1aa7bf1fa7ea6c47c35791eddd5bfe0b7957c7b2720a25

  • SSDEEP

    24576:/gpJmLOgHWi8bj11H2w5inpF7sONo/qiy7L9pvRDSG7EzqHm+Bmc7:/gpJmgf3zliFppBKqG+b

Malware Config

Extracted

Family

icedid

Campaign

1212497363

Extracted

Family

icedid

Campaign

1212497363

C2

trbiriumpa.com

Targets

    • Target

      iwdocument12.23.2022.docm

    • Size

      1.3MB

    • MD5

      655402ee5fbd4bdd9a6e08703bb3452e

    • SHA1

      8bbd519f46ebcdb6fbb3912fec5e36a03ce205bb

    • SHA256

      bd0512e03c8d40051d895de308e6e30c045470b54d47f1f71caea2675f01c468

    • SHA512

      36456bd7d7b1231a0c68f7ff285a0044a8fedf26170ad36e95b21f743adc4f04226fb6f0b3defd15cc1aa7bf1fa7ea6c47c35791eddd5bfe0b7957c7b2720a25

    • SSDEEP

      24576:/gpJmLOgHWi8bj11H2w5inpF7sONo/qiy7L9pvRDSG7EzqHm+Bmc7:/gpJmgf3zliFppBKqG+b

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Loads dropped DLL

MITRE ATT&CK Enterprise v6

Tasks