General

  • Target

    courtesyautomotivedoc08.11.doc

  • Size

    2.2MB

  • Sample

    220811-srbhsagggl

  • MD5

    00e8f42e0462d4abf8a6bb6960abe5b5

  • SHA1

    0235d1eb73c161a7fcc944d99730d8ed0200fb8e

  • SHA256

    3af042bd0b5a186b98920cf0b7066344609d6d6deb163ffb0b60325dcca66e44

  • SHA512

    927b5d5c0a8230738b5e56d05f2b0c669c2a564ef013707cce466250ddddb6d779077e4a8ee75ed39bc4a6485cbf30b6ba6edc8f819b74fd3f400e6c84460f96

Malware Config

Extracted

Family

icedid

Campaign

3570055661

Extracted

Family

icedid

Campaign

3570055661

C2

alexbionka.com

Targets

    • Target

      courtesyautomotivedoc08.11.doc

    • Size

      2.2MB

    • MD5

      00e8f42e0462d4abf8a6bb6960abe5b5

    • SHA1

      0235d1eb73c161a7fcc944d99730d8ed0200fb8e

    • SHA256

      3af042bd0b5a186b98920cf0b7066344609d6d6deb163ffb0b60325dcca66e44

    • SHA512

      927b5d5c0a8230738b5e56d05f2b0c669c2a564ef013707cce466250ddddb6d779077e4a8ee75ed39bc4a6485cbf30b6ba6edc8f819b74fd3f400e6c84460f96

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks