General

  • Target

    Setup_Win_29-12-2022_17-21-18.msi

  • Size

    772KB

  • Sample

    221229-x6mxksdh86

  • MD5

    37d819630a3536847fd4617c661695e2

  • SHA1

    134da7d0bbda94b054cb20cd9f6e759cd010c166

  • SHA256

    38a68c48a2cb002af6c7bd36412ce920202e04c5ef73d7ea58a1303122142891

  • SHA512

    47b5aed5ae382b56d3197c3ca53a5bfe55fc9f9c4be3b5503daac2223261373ae1e791e7dc3823365460f2df16a9ee72bfa358a21ebb46bf5597f72949da2165

  • SSDEEP

    12288:ewHL0DpxMX/wg4ZqU0UmmhtNOOdpxoPcrDnS34y9RPF8L:XHL0EvwglMtNjjoGS3bRPF8L

Malware Config

Extracted

Family

icedid

Campaign

2957048208

C2

whothitheka.com

Targets

    • Target

      Setup_Win_29-12-2022_17-21-18.msi

    • Size

      772KB

    • MD5

      37d819630a3536847fd4617c661695e2

    • SHA1

      134da7d0bbda94b054cb20cd9f6e759cd010c166

    • SHA256

      38a68c48a2cb002af6c7bd36412ce920202e04c5ef73d7ea58a1303122142891

    • SHA512

      47b5aed5ae382b56d3197c3ca53a5bfe55fc9f9c4be3b5503daac2223261373ae1e791e7dc3823365460f2df16a9ee72bfa358a21ebb46bf5597f72949da2165

    • SSDEEP

      12288:ewHL0DpxMX/wg4ZqU0UmmhtNOOdpxoPcrDnS34y9RPF8L:XHL0EvwglMtNjjoGS3bRPF8L

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Peripheral Device Discovery

2
T1120

Tasks