General

  • Target

    jarah,file,12.23.docm

  • Size

    1.3MB

  • Sample

    221224-wlymxaad38

  • MD5

    993ab5bc89bf05438f8389af6de00e35

  • SHA1

    babbc2cc9e58013ad8638dff0a32d5ffca74072a

  • SHA256

    2c60ce4900f8a5f108c58fc05a7705c27a62eed29e1fc230df86d652ef0b45ac

  • SHA512

    4b39d4c03fe7622dfe3fb6e31af820f7257862b337be087e53f8101f0ad33ddf59beb4270311c4e27479a2f8c0c38ce9788308c29edc262788a8237a8c0dbad4

  • SSDEEP

    24576:/WxpJmLOgHWi8bj11H2w5inpF7sONo/qiy7L9pvRD5G7EzqHm+Bmcf:/WxpJmgf3zliFppqKqG+/

Malware Config

Extracted

Family

icedid

Campaign

1212497363

C2

trbiriumpa.com

Targets

    • Target

      jarah,file,12.23.docm

    • Size

      1.3MB

    • MD5

      993ab5bc89bf05438f8389af6de00e35

    • SHA1

      babbc2cc9e58013ad8638dff0a32d5ffca74072a

    • SHA256

      2c60ce4900f8a5f108c58fc05a7705c27a62eed29e1fc230df86d652ef0b45ac

    • SHA512

      4b39d4c03fe7622dfe3fb6e31af820f7257862b337be087e53f8101f0ad33ddf59beb4270311c4e27479a2f8c0c38ce9788308c29edc262788a8237a8c0dbad4

    • SSDEEP

      24576:/WxpJmLOgHWi8bj11H2w5inpF7sONo/qiy7L9pvRD5G7EzqHm+Bmcf:/WxpJmgf3zliFppqKqG+/

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks