General

  • Target

    Scan_34219_INV.pdf

  • Size

    106KB

  • Sample

    230116-yyfzqscg58

  • MD5

    18939db528ac6d9bd411573cacdc7c6b

  • SHA1

    eb80cc0fb7e564011e1c89e09f75a0f149972590

  • SHA256

    82133edaad2f7295823c5f6ab0821522a44d83b7f7d0a1de1fe86067ddc8b8fd

  • SHA512

    034707e7e7f0e2b0aef6fde675bfd84dc6cf64dd4acfcb38015fc07188f97b5397df95aee19fb3bca68a33e16aef3279e4003a262bdf6762cc13be1fa84316f5

  • SSDEEP

    3072:+cEsOESv7ZPe95VsCTmtmWdOuWKRIN8M1EllApP3v/wE:+cTSv7Ne9NmtzdOuKIXApPwE

Malware Config

Extracted

Family

icedid

Campaign

3074491541

Extracted

Family

icedid

Campaign

3074491541

C2

dgormiugatox.com

Targets

    • Target

      Scan_34219_INV.pdf

    • Size

      106KB

    • MD5

      18939db528ac6d9bd411573cacdc7c6b

    • SHA1

      eb80cc0fb7e564011e1c89e09f75a0f149972590

    • SHA256

      82133edaad2f7295823c5f6ab0821522a44d83b7f7d0a1de1fe86067ddc8b8fd

    • SHA512

      034707e7e7f0e2b0aef6fde675bfd84dc6cf64dd4acfcb38015fc07188f97b5397df95aee19fb3bca68a33e16aef3279e4003a262bdf6762cc13be1fa84316f5

    • SSDEEP

      3072:+cEsOESv7ZPe95VsCTmtmWdOuWKRIN8M1EllApP3v/wE:+cTSv7Ne9NmtzdOuKIXApPwE

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Blocklisted process makes network request

    • Loads dropped DLL

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

4
T1012

Peripheral Device Discovery

2
T1120

System Information Discovery

4
T1082

Tasks