General

  • Target

    Docs_REF-1228#109.iso

  • Size

    1.9MB

  • Sample

    221228-wlk2taba94

  • MD5

    c3af9dc149f88a2541293cbf6eab4867

  • SHA1

    a5de23a20db4dec2dd6f9ca41cbdf617ef2094b9

  • SHA256

    ecdb5191814457d5ee4fa334e21d15b66b848d54c47c90ef2af82e40e58f71d9

  • SHA512

    204aaf9b8b4c6d7b262cfe1405e1f16558a394812ee6cb12f4468c81dd6ade3d2d5c71bc0cb21ea0e91ef8561393050fe40c368b449c153e246d4a2957b1d1de

  • SSDEEP

    6144:dUvv0OBrH6xz/YKp/1cCMC/pA9sedEr9hrqxyxF4ZTg1JP9uffWVIh8IKYlPA8x4:6v8OdBCMYCespKIA8x

Malware Config

Extracted

Family

icedid

Campaign

3247066813

C2

whothitheka.com

Targets

    • Target

      Docs_REF-1228#109.iso

    • Size

      1.9MB

    • MD5

      c3af9dc149f88a2541293cbf6eab4867

    • SHA1

      a5de23a20db4dec2dd6f9ca41cbdf617ef2094b9

    • SHA256

      ecdb5191814457d5ee4fa334e21d15b66b848d54c47c90ef2af82e40e58f71d9

    • SHA512

      204aaf9b8b4c6d7b262cfe1405e1f16558a394812ee6cb12f4468c81dd6ade3d2d5c71bc0cb21ea0e91ef8561393050fe40c368b449c153e246d4a2957b1d1de

    • SSDEEP

      6144:dUvv0OBrH6xz/YKp/1cCMC/pA9sedEr9hrqxyxF4ZTg1JP9uffWVIh8IKYlPA8x4:6v8OdBCMYCespKIA8x

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Tasks