Resubmissions

21-01-2023 19:15

230121-xyntxafc8s 10

21-01-2023 19:07

230121-xsnlysfc51 10

21-01-2023 18:30

230121-w5k6xsfb5v 10

21-01-2023 17:52

230121-wf796adc28 10

21-01-2023 17:50

230121-weml3adc24 1

21-01-2023 17:31

230121-v341ksfa7w 8

20-01-2023 15:34

230120-sz4jjagh42 10

20-01-2023 14:16

230120-rlkc3agb3v 1

20-01-2023 14:13

230120-rjwy3sgb21 1

General

  • Target

    https://firebasestorage.googleapis.com/v0/b/profound-veld-372422.appspot.com/o/6ncxCfGfXG%2FPaid_Offer_83_Jan_19.zip?alt=media&token=df54093b-4acf-45a1-8c62-d1100bc5a46f

  • Sample

    230120-sz4jjagh42

Malware Config

Extracted

Family

icedid

Campaign

3108046779

C2

klayerziluska.com

Targets

    • Target

      https://firebasestorage.googleapis.com/v0/b/profound-veld-372422.appspot.com/o/6ncxCfGfXG%2FPaid_Offer_83_Jan_19.zip?alt=media&token=df54093b-4acf-45a1-8c62-d1100bc5a46f

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

3
T1012

Peripheral Device Discovery

2
T1120

System Information Discovery

3
T1082

Tasks