General

  • Target

    Document_251_Unpaid_-1-12.pdf

  • Size

    136KB

  • Sample

    230112-zb3ewsag52

  • MD5

    1aaa86ed07b42bad2787fa25011e9e5a

  • SHA1

    2d01f27a42b2aef8fc0664d593d67a08f9ec94ae

  • SHA256

    1d769af38bea969c00501ff64b51f4e4fd2de2bedc7785b3471b7d12765c1a7d

  • SHA512

    92b1170d14c91ef94f1693df3be90c86489dd00a596ed8e0de427ea958ec30e4fbed72a2c544239a917903475d5e8b295c7595e16e2804a9406aa1a959a96ff3

  • SSDEEP

    1536:Yua8p56y2ZyTPAV55JI8i2RAFg9NjRbiZu5YhDpbFJjnR4f9e++aX6GkZ4vjXmA/:ryZiY55y8ivF00EoDJs1X0Z4LHOW

Malware Config

Extracted

Family

icedid

Campaign

1387823457

Targets

    • Target

      Document_251_Unpaid_-1-12.pdf

    • Size

      136KB

    • MD5

      1aaa86ed07b42bad2787fa25011e9e5a

    • SHA1

      2d01f27a42b2aef8fc0664d593d67a08f9ec94ae

    • SHA256

      1d769af38bea969c00501ff64b51f4e4fd2de2bedc7785b3471b7d12765c1a7d

    • SHA512

      92b1170d14c91ef94f1693df3be90c86489dd00a596ed8e0de427ea958ec30e4fbed72a2c544239a917903475d5e8b295c7595e16e2804a9406aa1a959a96ff3

    • SSDEEP

      1536:Yua8p56y2ZyTPAV55JI8i2RAFg9NjRbiZu5YhDpbFJjnR4f9e++aX6GkZ4vjXmA/:ryZiY55y8ivF00EoDJs1X0Z4LHOW

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Blocklisted process makes network request

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

3
T1012

Peripheral Device Discovery

2
T1120

System Information Discovery

3
T1082

Tasks