General

  • Target

    lesbellespaires,doc,12.23.2022.docm

  • Size

    1.3MB

  • Sample

    221224-wlyb5sad37

  • MD5

    fd3b7c4bb8ab1d94c1d0ae4de4472c5a

  • SHA1

    7d463b563b556829f775f4d5f30b11d41ea47784

  • SHA256

    1156677801d4e9c1d7e8cb2ed4160428c131f3ba9a66ef9d99a7e02afc70fe01

  • SHA512

    342315fb60f72dd4fbe3902b7063a1e8cd665e9bf4e8f423c298475cfee1a28e3964845b6caa7dfc6a6be71fcaa74b3615e9918e0dfc46f16a5b576b851c4c5b

  • SSDEEP

    24576:/CpJmLOgHWi8bj11H2w5inpF7sONo/qiy7L9pvRDuG7EzqHm+Bmco:/CpJmgf3zliFppVKqG+I

Malware Config

Extracted

Family

icedid

Campaign

1212497363

Extracted

Family

icedid

Campaign

1212497363

C2

trbiriumpa.com

Targets

    • Target

      lesbellespaires,doc,12.23.2022.docm

    • Size

      1.3MB

    • MD5

      fd3b7c4bb8ab1d94c1d0ae4de4472c5a

    • SHA1

      7d463b563b556829f775f4d5f30b11d41ea47784

    • SHA256

      1156677801d4e9c1d7e8cb2ed4160428c131f3ba9a66ef9d99a7e02afc70fe01

    • SHA512

      342315fb60f72dd4fbe3902b7063a1e8cd665e9bf4e8f423c298475cfee1a28e3964845b6caa7dfc6a6be71fcaa74b3615e9918e0dfc46f16a5b576b851c4c5b

    • SSDEEP

      24576:/CpJmLOgHWi8bj11H2w5inpF7sONo/qiy7L9pvRDuG7EzqHm+Bmco:/CpJmgf3zliFppVKqG+I

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks