General

  • Target

    Document[2023.10.11_08-07]_1.vbs

  • Size

    1012KB

  • Sample

    231011-3scgksec32

  • MD5

    46f350ec9ce87d9023042f97b29b91b9

  • SHA1

    676df45e5ad9000c6a6701ef27c35d0693a09132

  • SHA256

    df82ab215bf51e8ed504344bb7d2b1c50866177d07fa726cc10b1a484d6658e5

  • SHA512

    5237681e28dd5207c09ef17649363e0d0f6ab3d87066a51ff42552967a3317bf2c05cd39bfcc50a7cf5e7e99a82c95a7e8c944a05b84c838c7decbfc9b269b30

  • SSDEEP

    6144:H6kjN7KwEdQ5Q7llO99mZzMNLrM7Dir6DpgFMMjbwgXvuWlac89xwdjZEziC/von:/CGsyXCpoMMXs3s5ZImsQapwf

Malware Config

Extracted

Family

icedid

Campaign

361893872

Targets

    • Target

      Document[2023.10.11_08-07]_1.vbs

    • Size

      1012KB

    • MD5

      46f350ec9ce87d9023042f97b29b91b9

    • SHA1

      676df45e5ad9000c6a6701ef27c35d0693a09132

    • SHA256

      df82ab215bf51e8ed504344bb7d2b1c50866177d07fa726cc10b1a484d6658e5

    • SHA512

      5237681e28dd5207c09ef17649363e0d0f6ab3d87066a51ff42552967a3317bf2c05cd39bfcc50a7cf5e7e99a82c95a7e8c944a05b84c838c7decbfc9b269b30

    • SSDEEP

      6144:H6kjN7KwEdQ5Q7llO99mZzMNLrM7Dir6DpgFMMjbwgXvuWlac89xwdjZEziC/von:/CGsyXCpoMMXs3s5ZImsQapwf

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks