General

  • Target

    7d40d5c29364d89e717b97103b182458.bin

  • Size

    1.3MB

  • Sample

    230116-zzs65ade92

  • MD5

    430c4fa6782991a256275f7b006fa7e9

  • SHA1

    c5a7502da808146f737764eb949ab8393819032d

  • SHA256

    874b32f2f26849fb9d3c4fed146ab4ae970698b9e11d51740b874b982e02cb9b

  • SHA512

    4c0ac077ba76acf34f000203752272bd42f79287ad93ef155b154052aad500e2581f4977f7cced6bba59ddaf5ecbedd01b265372c0aadaef03579a8077a2a7fd

  • SSDEEP

    24576:0sFmsC0g4ycyzarRM/kJLRfSd6tVJjNERAP6BSH/ogkSuPi1qb3CF:0sFZCmycyzaNmkJXDNzP60fogEOqby

Malware Config

Extracted

Family

icedid

Campaign

1212497363

C2

trbiriumpa.com

Targets

    • Target

      02fec211becd4e12526e15f94ce265b542f1c6184ed9e00a0b7739b8adbe2427.docm

    • Size

      1.3MB

    • MD5

      7d40d5c29364d89e717b97103b182458

    • SHA1

      f12c897f7be901fe612b531a601ee164b4f01ad0

    • SHA256

      02fec211becd4e12526e15f94ce265b542f1c6184ed9e00a0b7739b8adbe2427

    • SHA512

      b58ffcf09f2b5ac0df4df4e475fce3a251a274ef1d886893d1389e3d08eed2e6641666ae3e2f3127f7666145f7696a6985708f9a100d47d1d48a0a7c7be7153d

    • SSDEEP

      24576:/XtpJmLOgHWi8bj11H2w5inpF7sONo/qiy7L9pvRDoG7EzqHm+BmcN:/XtpJmgf3zliFppjKqG+t

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks