General

  • Target

    d0869ecff3322c6bc1c1d7cdbafa4425ed30f06ffa405f2a813d1231b0a86c60.msi

  • Size

    1.1MB

  • Sample

    240401-tf61zsgh9w

  • MD5

    fc55f67e162226b3a95a8dd1aac2e710

  • SHA1

    aa3a9a40c5dcfbac8a89ff2b466d09439d78b9f1

  • SHA256

    d0869ecff3322c6bc1c1d7cdbafa4425ed30f06ffa405f2a813d1231b0a86c60

  • SHA512

    83bf848ad2506cb0498a1f6159cae1003c3f998b657e9d8b40d012cbbc8eaf57440d1969348dd41a1e9f37b50d5e4707bced446b30b9bafb400ba8045210b534

  • SSDEEP

    24576:QHL0e3k4usYYqbczfGtm4fSpHZ4LHpt0:Qr0e3kFzczfKmUSpgY

Malware Config

Extracted

Family

icedid

Campaign

2564808981

C2

statifaronta.com

Targets

    • Target

      d0869ecff3322c6bc1c1d7cdbafa4425ed30f06ffa405f2a813d1231b0a86c60.msi

    • Size

      1.1MB

    • MD5

      fc55f67e162226b3a95a8dd1aac2e710

    • SHA1

      aa3a9a40c5dcfbac8a89ff2b466d09439d78b9f1

    • SHA256

      d0869ecff3322c6bc1c1d7cdbafa4425ed30f06ffa405f2a813d1231b0a86c60

    • SHA512

      83bf848ad2506cb0498a1f6159cae1003c3f998b657e9d8b40d012cbbc8eaf57440d1969348dd41a1e9f37b50d5e4707bced446b30b9bafb400ba8045210b534

    • SSDEEP

      24576:QHL0e3k4usYYqbczfGtm4fSpHZ4LHpt0:Qr0e3kFzczfKmUSpgY

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Blocklisted process makes network request

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Tasks