General

  • Target

    Setup_Win_31-12-2022_01-50-16.zip

  • Size

    458KB

  • Sample

    221231-hm25tsce6z

  • MD5

    1bb92c333fa5c1e2b18934f05fac6e51

  • SHA1

    d4f21faaefd382c4089146c43eefb0f1458337d1

  • SHA256

    e519b8b79c30ff05cba6b43dc9a6bb03f715c053bb0e8e50abed123cf4f7f9ef

  • SHA512

    16b07138195cccbc50b5b524d51d6e9dba74ecc6c81e288ecd94367b6751b82b64bd815e2124df1fa5ee708d3bae78efb1f362fa6f153d7277afce716dd6eb93

  • SSDEEP

    12288:Pluss5FqDiw24ZqUnZfahtdOmqL6Nu6jcwSZsmk4dhIfi8L:PUh50Diw2lustd0L6Nv9SZsZ4AfDL

Malware Config

Extracted

Family

icedid

Campaign

2957048208

C2

whothitheka.com

Targets

    • Target

      Setup_Win_31-12-2022_01-50-16.msi

    • Size

      772KB

    • MD5

      4509edb7effdfc57e288bb7b23fa0180

    • SHA1

      edd9910a9b2774e5a9a36ca096d299b092556016

    • SHA256

      c0a063352598eae28f226207503d864a06f5490497b074a9390927793ea16bfd

    • SHA512

      c6a321a42f6235e89b9c256ccdc2d697437baa07574c4da12e65a8c225a007f5da7a6e9b8e14d88a27de19d7b78b5375e3938c5be9054fa62f645fe2420afda0

    • SSDEEP

      12288:TwHL0DpsMX/wg4ZqU0UmmhtNOOdpxoPcrDnS34y9RPF8L:0HL0tvwglMtNjjoGS3bRPF8L

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Peripheral Device Discovery

2
T1120

Tasks