General

  • Target

    4f1f3962f51767cb687e21caa52ec86d.bin

  • Size

    1.3MB

  • Sample

    230116-yx967acg56

  • MD5

    892cf782e4b26665cd2fc78f0ffac391

  • SHA1

    834c52c868ba5d02c8eb374462935ae07f72da3b

  • SHA256

    c20475baf3b33e1e3f840b591174bb9846903bdaadd762ee635e7d2e8cc05f47

  • SHA512

    2b632086662be4602af87cf49ba08e40a34bc25022ba156ccc872fccb55df7327ffc254461a74af2210722922c03fab673099248f3bcb261ff4aa388a9733c35

  • SSDEEP

    24576:525MAohXAvk39ZFr18oRM/qxW7lhB4M5z5mCdNeG6hcMVhLH5e8fMChpg:s5M4ctjr1eph+M5zH3Chq

Malware Config

Extracted

Family

icedid

Campaign

1212497363

C2

trbiriumpa.com

Targets

    • Target

      a531fa89547828c68554b4a358cb4eaa21198e9b1fcd8efcbbfa5bbf295217ec.docm

    • Size

      1.3MB

    • MD5

      4f1f3962f51767cb687e21caa52ec86d

    • SHA1

      0886d9a017d527fca5d347a05f1ebd9006160846

    • SHA256

      a531fa89547828c68554b4a358cb4eaa21198e9b1fcd8efcbbfa5bbf295217ec

    • SHA512

      e1c3419bfd0c4fa57b327c2ccc547f6622a586842189e72788d3c6b0515a81812f45170393b1e445b1b3cca66127d74a1fb8cf1dbcaee8ec8972379c1bae57c9

    • SSDEEP

      24576:/CpJmLOgHWi8bj11H2w5inpF7sONo/qiy7L9pvRD8G7EzqHm+BmcS:/CpJmgf3zliFpp/KqG+y

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Loads dropped DLL

MITRE ATT&CK Enterprise v6

Tasks