General

  • Target

    fd3b7c4bb8ab1d94c1d0ae4de4472c5a.bin

  • Size

    1.3MB

  • Sample

    230117-kf4q7aha4z

  • MD5

    69fa77fb6b02830d898ad62c210b9c86

  • SHA1

    ac95427aaf4ee286267c4dbfdf21cffd425c5ecb

  • SHA256

    e55f2985dfbf754e49fbb2c0ff9a735c55a85e5afb3810c5cb4bd9a1c85b23c9

  • SHA512

    3e781f7854386bfbca1b8b771add1b7910bcc553bddc2dfd2c3d391396b85b542148afa9ad5482291751011b91d9dbe86a028642a12a768721ebad95b113d19d

  • SSDEEP

    24576:J9QGufDcmVnrGmLQNxKCUgEP97ryeem8qa+Vhe1OEq6SoF7CWC6+WKy10N3:Jv2VnrtLZCUgorwm8qlVxYSw7CWC6Pm3

Malware Config

Extracted

Family

icedid

Campaign

1212497363

C2

trbiriumpa.com

Targets

    • Target

      1156677801d4e9c1d7e8cb2ed4160428c131f3ba9a66ef9d99a7e02afc70fe01.docm

    • Size

      1.3MB

    • MD5

      fd3b7c4bb8ab1d94c1d0ae4de4472c5a

    • SHA1

      7d463b563b556829f775f4d5f30b11d41ea47784

    • SHA256

      1156677801d4e9c1d7e8cb2ed4160428c131f3ba9a66ef9d99a7e02afc70fe01

    • SHA512

      342315fb60f72dd4fbe3902b7063a1e8cd665e9bf4e8f423c298475cfee1a28e3964845b6caa7dfc6a6be71fcaa74b3615e9918e0dfc46f16a5b576b851c4c5b

    • SSDEEP

      24576:/CpJmLOgHWi8bj11H2w5inpF7sONo/qiy7L9pvRDuG7EzqHm+Bmco:/CpJmgf3zliFppVKqG+I

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks