General

  • Target

    2A7D9561C3501EEA0D94A3F550745C5C19E151BA58DECD880BAAF900567103D8

  • Size

    1.3MB

  • Sample

    230104-tmtdgacb6s

  • MD5

    e2cce86d91f8fc74def2dda954ac7b55

  • SHA1

    63bb523dc255c91d2ebd9fee31366a4b2a0a1501

  • SHA256

    2a7d9561c3501eea0d94a3f550745c5c19e151ba58decd880baaf900567103d8

  • SHA512

    f5753c99002dcc5d39a0a2030e393139e180b9a7f779b3798704730e661aa60cafaa1b684d83b26416e822cf0b3cadde5df615e76eaa6ccd41bcbed797500faa

  • SSDEEP

    24576:/SpJmLOgHWi8bj11H2w5inpF7sONo/qiy7L9pvRDqG7EzqHm+Bmca:/SpJmgf3zliFpppKqG+6

Malware Config

Extracted

Family

icedid

Campaign

1212497363

C2

trbiriumpa.com

Targets

    • Target

      2A7D9561C3501EEA0D94A3F550745C5C19E151BA58DECD880BAAF900567103D8

    • Size

      1.3MB

    • MD5

      e2cce86d91f8fc74def2dda954ac7b55

    • SHA1

      63bb523dc255c91d2ebd9fee31366a4b2a0a1501

    • SHA256

      2a7d9561c3501eea0d94a3f550745c5c19e151ba58decd880baaf900567103d8

    • SHA512

      f5753c99002dcc5d39a0a2030e393139e180b9a7f779b3798704730e661aa60cafaa1b684d83b26416e822cf0b3cadde5df615e76eaa6ccd41bcbed797500faa

    • SSDEEP

      24576:/SpJmLOgHWi8bj11H2w5inpF7sONo/qiy7L9pvRDqG7EzqHm+Bmca:/SpJmgf3zliFpppKqG+6

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks