Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- 2020-07-20 (MONDAY) WORD DOCS WITH MACROS FOR ICEDID (BOKBOT)
- REFERENCE:
- - https://www.malware-traffic-analysis.net/2020/07/20/index.html
- 12 EXAMPLES OF SHA256 HASHES FOR WORD DOCS WITH MACROS FOR ICEDID:
- - 19e84fa825b31a4344d2d992facd69866001efd9d7ab9de2bba2f8bad54efa90 charge_07.20.doc
- - 2446e5fa5a412550fa02b22076d8bac917d219d027fa867fc60a053133288602 decree.07.20.2020.doc
- - cc17289f5af8320473f104037b4e0f431a061fe0d7ba62d6fce35009cd808017 details 07.20.doc
- - 5f5453bd65e861a7b879ad5c020157cf2473aa35bb90c12a998cd41cd23a8ff2 docs 07.20.20.doc
- - 1fe806ac6b37d4425a40a9fe9e582ab05c9676c8331a2b1f38bc458e966aeac0 documents-07.20.doc
- - 67f04eff930119f5a70814d008dd971e8a868e3bca17756fa07af254a802d0ba enjoin.07.20.2020.doc
- - 329064dd4d1880b657600909c4048c97dc4b282a5e9b4cff06dd117070d708f5 input.07.20.2020.doc
- - c971c696a37abe3f8628c3888048096d42873c1e91d778b7dfba886820058a41 inquiry,07.20.doc
- - ff9f377f5d6ac1bfcdb7a7b185549ca3761a714ca787456ba656871208ec1b48 legal paper.07.20.doc
- - d6e51057214555ee71468575f08afe5128bda94e6539bbab8b89fb36121de10a official paper-07.20.doc
- - 0250519e459164a9de842bd9e6bee64c48c4e8ad6d85e71aed8810d836646332 prescribe -07.20.2020.doc
- - bfd58b7d1017d89586f7582891db297b5f75fa867ae282b6ed7329b168895bfa question,07.20.2020.doc
- DOMAINS HOSTING ICEDID INSTALLER:
- - b5js78uz[.]com
- - brult5bw[.]com
- - g0zh8lb3[.]com
- - kip2moht[.]com
- - pqfhjp0j[.]com
- - yamrii4g[.]com
- - z977oq4e[.]com
- - zp8kbgfs[.]com
- HTTP GET REQUESTS FOR THE ICEDID INSTALLER DLL:
- - GET /4adr/lotv.php?l=iadi1.cab
- - GET /4adr/lotv.php?l=iadi2.cab
- - GET /4adr/lotv.php?l=iadi3.cab
- - GET /4adr/lotv.php?l=iadi4.cab
- - GET /4adr/lotv.php?l=iadi5.cab
- - GET /4adr/lotv.php?l=iadi6.cab
- - GET /4adr/lotv.php?l=iadi7.cab
- - GET /4adr/lotv.php?l=iadi8.cab
- - GET /4adr/lotv.php?l=iadi9.cab
- - GET /4adr/lotv.php?l=iadi10.cab
- - GET /4adr/lotv.php?l=iadi11.cab
- - GET /4adr/lotv.php?l=iadi12.cab
- 20 EXAMPLES OF SHA256 HASHES FOR ICEDID INSTALLER DLL FILES:
- - 0158a3b44b5fc73018585d050cd915b35ae7cb8579cd42cc240f5e0015607937
- - 03afc8c1250b8bf37102da9158250f0fd07a95a44c77e0216a0623f0aaadf392
- - 049b60f024aa1255461c4420aef64fc17ee26e8bab77c706c9d7e9a8d5b1ea2f
- - 0981406f5c10387acecc79272b1a8eeac56ce6f13ff4bde6290a8352cc413e7d
- - 2ce6cc6883a333e0b1f0626e51db0dc36e50cf43a53015665f3a530469d1e94c
- - 3033c1e6465cce3c1c83c1526c4e94ef23fb8d8b5952c1fd59f0c5688ecc0140
- - 3dd735178216b3c00bb30a87556a4faca7e030d2b721bc30874f269b4eb79ff0
- - 3f2f7f57ac8888a557e0620a399cfb3e9e073d1465dac31b6161484cc5f70028
- - 4b4bf13fe2914ed76e38ae1b982bd0ea12866bc1ff77d1c90259357ff5abc32e
- - 5b00d2552ddf2a28c761d197b9479a60175cb7627c5d297239ad2dac844e7e3b
- - 66b748a75a12ce37a3f3d38b45c725bc8b9bcd4cefa92b40578c9b729af0f2ae
- - 9573bb7a90860f3302e3f298b2555dfd7680aecd24997b5aa3990f98d57e3a11
- - a67156403bdd5d3c52334e9dcb8fb8dd8bd7e51548fbffee5ceea7e11b953cf2
- - ba233c19ca3a69d11f386f4b23499be5516acbe6c96764931c470529d4c29aa5
- - bbee5d1620372d0ef2f195f3f629c3cec392384f8a7a0409b255e73d06761cb2
- - d32bcfc257678aa6983dba4eb574312060436d5efbb5f9dcbeecccacd50cd62e
- - d5936fb27fb7d59a3c670157f5e31679c38a9b92c026349dc816631ee7619fb1
- - e6ca8c5341cfe074db4dab1efd9363ff1eb5aa5121a790bdea6af79469bff748
- - f2b9110bb7da63ee536eb1e29c34dbc1b9fad84d286395434c41304d3028c668
- - f785ed5227ef3772947c15ba47992a8f36cce03cf7a6f31e3334af2050c59e18
- - NOTE: Run method for the above DLL files: Regsvr32.exe [filename]
- EXAMPLES OF LOCATIONS FOR ICEDID INSTALLER DLL FILE:
- - Most of these were in the directory as the Word document, file name: c2.pdf
- - C:\ProgramData\7779.jpg
- - C:\ProgramData\8930.jpg
- - C:\ProgramData\56236.jpg
- TRAFFIC FROM AN INFECTED WINDOWS HOST:
- - 194.36.189[.]170 port 80 - g0zh8lb3[.]com - GET /4adr/lotv.php?l=iadi7.cab
- - port 443 - support.oracle[.]com - HTTPS traffic (not inherently malicious)
- - port 443 - www.oracle[.]com - HTTPS traffic (not inherently malicious)
- - port 443 - www.intel[.]com - HTTPS traffic (not inherently malicious)
- - port 443 - support.microsoft[.]com - HTTPS traffic (not inherently malicious)
- - port 443 - support.apple[.]com - HTTPS traffic (not inherently malicious)
- - 161.35.148[.]20 port 443 - ldrplutos[.]casa - HTTPS traffic generated by IcedID installer
- - port 443 - help.twitter[.]com - HTTPS traffic (not inherently malicious)
- - 161.35.146[.]115 port 443 - cutterfighter[.]club - HTTPS traffic generated by IcedID
- - 161.35.146[.]115 port 443 - 3boardeux[.]top - HTTPS traffic generated by IcedID
- MALWARE FROM AN INFECTED WINDOWS HOST:
- - SHA256 hash: 4f619d009937aa25f7e62ceefc2c2137b008d8e8bf093eee20d044c69c0247bf
- - File size: 396,615 bytes
- - File location: C:\Users\[username]\AppData\Local\Temp\~480046.tmp
- - File type: PNG image data, 601 x 280, 8-bit/color RGB, non-interlaced
- - File description: PNG image retrieved from ldrplutos.casa with encoded data used to create IcedID EXE below.
- - SHA256 hash: 15d9f31296311240d9f969b6e850edd3002a0e0ee52c2847ef0f777cff73652a
- - File size: 392,192 bytes
- - File location: C:\Users\[username]\AppData\Local\Temp\~579765.exe
- - File description: IcedID EXE created using encoded data from the above PNG image
- - SHA256 hash: 0d4404a9cb36278b3d02db77d84da55e9066c16ea1a6ad590ae348223e0f1614
- - File size: 392,192 bytes
- - File location: C:\Users\[username]\AppData\Roaming\[username]\{EBA2B605-D496-E685-237D-EFB01DE63FAF}\ifseiu64.exe
- - File description: IcedID EXE persistent on the infected Windows host
- - SHA256 hash: e6e0adcc94c3c4979ea1659c7125a11aa7cdabe24a36f63bfe1f2aeee2c5d3a1
- - File size: 669,381 bytes
- - File location: {D80C7907-C255-0B68-0512-C7E6964E6799}
- - File type: PNG image data, 614 x 514, 8-bit/color RGB, non-interlaced
- - File description: PNG image with encoded data related to the IcedID infection
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement