General

  • Target

    993ab5bc89bf05438f8389af6de00e35.bin

  • Size

    1.3MB

  • Sample

    230116-1jfrjahh4v

  • MD5

    3d833caca67370afe2125b53e89bb234

  • SHA1

    2e033bc781bac048996dcaa31799f520c4f847c9

  • SHA256

    e6a08ea57393396d0e65d01ad0ef3291f1e844a9790133222e1794c39a336b22

  • SHA512

    0d793e1fe2932729bd3a243483f1a64c4604134329c02089c794d3fd861c2dc999bb53e3bc305123eddfc7817c7ed51ebcb1c4ccec17450ec8430dc3da9e2cf7

  • SSDEEP

    24576:08H87WvrXFsiGOs1yLkfXrSWaAhLo85i02CsU8ID9rWi:d8KrXzGv0LkfbSAxi02CsU8IUi

Malware Config

Extracted

Family

icedid

Campaign

1212497363

C2

trbiriumpa.com

Targets

    • Target

      2c60ce4900f8a5f108c58fc05a7705c27a62eed29e1fc230df86d652ef0b45ac.docm

    • Size

      1.3MB

    • MD5

      993ab5bc89bf05438f8389af6de00e35

    • SHA1

      babbc2cc9e58013ad8638dff0a32d5ffca74072a

    • SHA256

      2c60ce4900f8a5f108c58fc05a7705c27a62eed29e1fc230df86d652ef0b45ac

    • SHA512

      4b39d4c03fe7622dfe3fb6e31af820f7257862b337be087e53f8101f0ad33ddf59beb4270311c4e27479a2f8c0c38ce9788308c29edc262788a8237a8c0dbad4

    • SSDEEP

      24576:/WxpJmLOgHWi8bj11H2w5inpF7sONo/qiy7L9pvRD5G7EzqHm+Bmcf:/WxpJmgf3zliFppqKqG+/

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks