General

  • Target

    Document_85_Copy_01-12.zip

  • Size

    108KB

  • Sample

    230112-v75snscf7t

  • MD5

    9be51ec0cc1d11ec3954a2334059300e

  • SHA1

    5b6c04e35e2b0b3c3129a05519790cdb7a60a67f

  • SHA256

    08f1fcad30ccf7fa1cfc59033a91d984a3dbeda5d581b0b24a196b80512c551d

  • SHA512

    0d2dd88d144b194e7a75b8410c329cbfaea8e7a38fd1ec9a79f4839be1b0299d34fb3fb80174f477427bfb7d95f9327526e67b326a3ee0c861c5cfa849a6aa36

  • SSDEEP

    3072:wjVCUVdwZ1VHTPxH+/2D3hGaLU5x7QsUeN7Iz:X2wZjHrxH+/YxGDjQsp2z

Malware Config

Extracted

Family

icedid

Campaign

1387823457

C2

allertmnemonkik.com

Targets

    • Target

      Document_85_Copy_01-12.zip

    • Size

      108KB

    • MD5

      9be51ec0cc1d11ec3954a2334059300e

    • SHA1

      5b6c04e35e2b0b3c3129a05519790cdb7a60a67f

    • SHA256

      08f1fcad30ccf7fa1cfc59033a91d984a3dbeda5d581b0b24a196b80512c551d

    • SHA512

      0d2dd88d144b194e7a75b8410c329cbfaea8e7a38fd1ec9a79f4839be1b0299d34fb3fb80174f477427bfb7d95f9327526e67b326a3ee0c861c5cfa849a6aa36

    • SSDEEP

      3072:wjVCUVdwZ1VHTPxH+/2D3hGaLU5x7QsUeN7Iz:X2wZjHrxH+/YxGDjQsp2z

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Blocklisted process makes network request

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks