General

  • Target

    https://firebasestorage.googleapis.com/v0/b/uplifted-theory-371719.appspot.com/o/NP6oE008nu%2Frequest_01-10_INV-260.zip?alt=media&token=8094aa26-471d-4968-85bf-ab0ba94484c4

  • Sample

    230112-ddq9rafa35

Malware Config

Extracted

Family

icedid

Campaign

1421378695

C2

ebothlips.com

Targets

    • Target

      https://firebasestorage.googleapis.com/v0/b/uplifted-theory-371719.appspot.com/o/NP6oE008nu%2Frequest_01-10_INV-260.zip?alt=media&token=8094aa26-471d-4968-85bf-ab0ba94484c4

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Blocklisted process makes network request

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

3
T1012

Peripheral Device Discovery

2
T1120

System Information Discovery

3
T1082

Tasks