General

  • Target

    Document-755.iso

  • Size

    1.4MB

  • Sample

    230117-txyqyafb7t

  • MD5

    e4c27c946ec3abf3d7ea2fd64019ccfe

  • SHA1

    2674780c3aac37dc1a380941d6611b224aeb3edf

  • SHA256

    8fcc001e65fd53bd7ee288c5972ac58f4d8d12397ac6a2dd9c1aa85aa0e61235

  • SHA512

    5c3913219f800ee12d1e0543020cad602d9ebff243decd7f933e3fcbe5d7697e00b057bb3ce4a0f5a68cd7974b8276a7295e5d3457e6c1504e659d79e4d267ee

  • SSDEEP

    6144:16sbYTf1IFpSQjAsK67TbDkJGvPiaTB00Czya:4Nf67h0JGSaTi

Malware Config

Extracted

Family

icedid

Campaign

3074491541

C2

dgormiugatox.com

Targets

    • Target

      Document-755.iso

    • Size

      1.4MB

    • MD5

      e4c27c946ec3abf3d7ea2fd64019ccfe

    • SHA1

      2674780c3aac37dc1a380941d6611b224aeb3edf

    • SHA256

      8fcc001e65fd53bd7ee288c5972ac58f4d8d12397ac6a2dd9c1aa85aa0e61235

    • SHA512

      5c3913219f800ee12d1e0543020cad602d9ebff243decd7f933e3fcbe5d7697e00b057bb3ce4a0f5a68cd7974b8276a7295e5d3457e6c1504e659d79e4d267ee

    • SSDEEP

      6144:16sbYTf1IFpSQjAsK67TbDkJGvPiaTB00Czya:4Nf67h0JGSaTi

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Blocklisted process makes network request

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Tasks