General

  • Target

    d3179af6d42296fd9199a9bf69e0ee7b.bin

  • Size

    1.3MB

  • Sample

    230116-2w3x9sag9y

  • MD5

    e0f70390aca4e3db6a658800db31f959

  • SHA1

    1edc8aa66fdade064f35e72d6b165047c46347f3

  • SHA256

    56a40897761832a2426115a7208ab2c93f198897c980a7d66c741c55dd5922b6

  • SHA512

    6f630610e09369f5cc2f3daac7ff4b4fc06ddc8338fb96a4c2cdb1ce6c5f39d69048702e7db6fca07c7849b2dc45f07c94935b6045cbd359d056b3bdab0ce787

  • SSDEEP

    24576:PR48AowSdmBDYRXotZG9ooGm3KKnbeUXjLx01rMNORMImLPnCCn+7JEL:PR4og3tZG99Gm3KKnBzh9IYT+7Ja

Malware Config

Extracted

Family

icedid

Campaign

1212497363

C2

trbiriumpa.com

Targets

    • Target

      b0bbb2f2fbfa2750a8ae8a14d3fecf5cbb8e295707bbf77af2f38765c3785060.docm

    • Size

      1.3MB

    • MD5

      d3179af6d42296fd9199a9bf69e0ee7b

    • SHA1

      55827e92fb051250f68642a94b6e1e24171ee6f0

    • SHA256

      b0bbb2f2fbfa2750a8ae8a14d3fecf5cbb8e295707bbf77af2f38765c3785060

    • SHA512

      c018b0998f930a56729bf7b1fb7f4095330d89a553d442437bbd824186e7a9f081cc12b8e9e90b7164c3f0ee1a8efba4f41e31a027ae54f4b882c1ed3a3a7add

    • SSDEEP

      24576:/gs5pJmLOgHWi8bj11H2w5inpF7sONo/qiy7L9pvRD6G7EzqHm+Bmcb:/NpJmgf3zliFpp5KqG+7

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks